All Course Flashcards

1
Q

Application Layer (7th layer)

A

Interacts with application programs that incorporate a communication component such as your Internet
browser and email (provides user interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bus Topology

A

The computers share the media (coaxial cable) for data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAT6 (category 6)

A

Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100
meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crossover

A

Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with
the receive signal on the other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSMA/CD

A

Carrier sense multiple access with collision detection is the Ethernet LAN media-access method (used to
prevent collisions in wired Ethernet networks) Used in wireless networks for to reduce collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Link Layer (2nd layer)

A

Layer of the OSI reference model that handles error recovery, flow control (synchronization), and
sequencing (controls which terminals are sending and receiving. Media access is controlled by the Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deterministic

A

Access to the network is provided at fixed time intervals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethernet, Physical, Hardware, or Adapter Address

A

Other names for MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall Protection

A

Used to prevent unauthorized access to your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Host Address

A

The portion of the IP address that defines the location of the networking device connected to the network;
also called the host address - Same as host number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hotspots

A

A limited geographic area that provides wireless access for the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hub

A

Broadcasts the data it receives to all devices connected to its ports… it is possible for network devices to pick up a data intended for a different device… considered
a multiport repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IANA

A

The Internet Assigned Numbers Authority is the agency that assigns IP addresses to computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICMP

A

Internet Control Message Protocol (perform diagnostics, report errors, control the flow of data in
the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IEEE

A

Institute of Electrical and Electronics Engineers, one of the major standard-setting bodies for technological
development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intranet

A

An internal network that provides file and resource sharing but ifs not accessed from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP Address

A

Unique 32-bit address that identifies on which network the computer is located as well as
differentiates the computer from all other devices on the same network; they are logical addresses and can be found using the ipconfig/all command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IP Internetwork

A

A network that uses IP addressing for identifying devices connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ipconfig/all

A

Enables the MAC address information to be displayed

from the command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ISP

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Link Integrity Test

A

Protocol used to verify that a communication link between two Ethernet devices has been established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Link Light

A

Indicates that the transmit and receive pairs are properly aligned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Link Pulses

A

Sent by each of the connected devices via the twisted- pair cables when data is not being transmitted to
indicate that the link is still up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Local Area Network (LAN)

A

Network of users that share computer resources in a limited area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MAC Address

A

A unique 6-byte address assigned by the vendor of the network interface card; A MAC address has two
portions. The OUI is comprised of the first 6 digits and the last half is assigned by the manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Mbps

A

Megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Mesh Topology

A

All networking devices are directly connected to each other (fault tolerant; stations can still communicate if
some segments go down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Multiport Repeater

A

Another name for a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Network Address Translation (NAT)

A

Translates the private IP address to a public address for routing over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network Interface Card (NIC)

A

The electronic hardware used to interface the computer to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Network Layer (3rd layer)

A

Defines how data packets are routed in a network. Accepts outgoing messages and combines messages
or segments into packets, adding a header that includes routing information (provides a logical path for data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network Number

A

The portion of the IP address that defines which network the IP packet is originating from or being
delivered to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Organizationally Unique Identifier (OUI)

A

The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware (ex. Network
interface card has MAC address of 00-00-86-15-7A, the OUI is 00-00-86).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

OSI

A

Open system interconnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

OSI Model

A

The seven layers describing network functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Overloading

A

Where NAT translates the home network’s private IP addresses to a single public IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Packet

A

Provides grouping of the information for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Ping

A

Command used to test that a device on the network is reachable (If you can’t connect to a networked
computer, you can use the ping command to check connectivity) Used in windows in the command window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Port Address Translation (PAT)

A

A port number is tracked with the client computer’s private address when translating to a public address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Ports

A

The physical input/output interfaces to the networking hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Presentation Layer (6th layer)

A

Layer of the OSI reference model that accepts and structures the messages for the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Private Addresses

A

IP addresses set aside for use in private intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Protocol

A

Set of rules established for users to exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Range Extender

A

Device that relays the wireless signals from an access point or wireless router into areas with a weak signal
or no signal at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

RJ-45

A

The 8-pin modular connector used with CAT6/5e/5 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Service Set Identifier (SSID)

A

Name that is used to identify your wireless network and is used by your access point or wireless router to
establish and association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Session Layer (5th layer)

A

Layer of the OSI reference model that provides the control functions necessary to establish, manage, and terminate the connections (SQL and NFS technologies
are on the session layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

SSID

A

Service set identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Star Topology

A

The most common networking topology in today’s LANs where all networking devices connect to a central
switch or hub, each device connects to a central point via a point-to-point link. Each device is connected to its own port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Stateful Packet Inspection (SPI)

A

Type of a firewall that inspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

6to4 Prefix

A

a technique that enables IPv6 hosts to communicate over the IPv4 Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Access Control Lists (ACLs)

A

A basic form of firewall protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ACK

A

Acknowledgement packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Anycast Address

A

Is obtained from a list of addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ARIN

A

American Registry for Internet Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ARP

A

Address Resolution Protocol, used to map and IP address to its MAC address (the destination gets the
sender’s addresses from the ARP request)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

ARPAnet

A

Advanced Research Projects Agency network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Brute Force Attack

A

Attacker uses every possible combination of characters for the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Buffer Overflow

A

Happens when a program tries to put more data into a buffer than it was configured to hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

CIDR

A

Classless interdomain routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

CIDR Block

A

The grouping of two or more class networks together; also called supernetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Class A, B, C, D, and E

A

The five classes of IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Classful

A

The IP and subnet addresses are within the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Connection-Oriented Protocol

A

Establishes a network connection, manages the delivery of data, and terminates the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Denial of Service (DoS)

A

A service is being denied to a computer, network or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DES, 3DES

A

Data Encryption Standard, Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Dictionary Attack

A

Uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to
your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Diffie-Hellman

A

Key generation algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Directed Braoadcast

A

The broadcast is sent to a specific subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

EAP

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

ESP

A

Encapsulating Security Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Firewall

A

Used in computer networks for protecting the network; Personal firewall software is typically based on basic packet filtering inspections where the firewall accepts or denies incoming network traffic based on information contained int he packet’s TCP or IP headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Full IPv6 Address

A

All 32 hexadecimal positions contain a value other than 0 (double colons, 32 hex characters, 128 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Hex

A

Hexadecimal, base 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

ICANN

A

The Internet Corporation of Assigned Names and Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

IGMP

A

Internet Group Message Protocol (Used for streaming media… data is passed through to the application layer
for immediate processing without error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Internet Layer

A

Defines the protocols used for addressing and routing data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

IP (Internet Protocol)

A

Defines the addressing used to identify the source and destination addresses of data packets being delivered
over an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

IP Tunnel

A

An IP packet encapsulated in another IP packet (a secure VPN connection between two endpoints in
known as an IP Tunnel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

IPng

A

The next generation IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

IPsec

A

IP security is used to encrypt data between various networking devices (AES, ESP, and DES are security
protocols, not TKIP which is wireless protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

IPv4

A

The IP version currently being used on the Internet (Dotted decimal) Uses five classes of IP addresses, is
being replaced by IPv6. Made of up 4 bytes and octets. An octet is 8 bits. 4 make up 32 bits of an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

IPv6

A

IP version 6 (unicast, multicast, and anycast all IPv6 addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

ISAKMP

A

Internet Security Association and Key Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

L2F

A

Layer 2 Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

L2TP

A

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Malware

A

Malicious programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

MD5

A

Message Digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Multicast Address

A

Data packets sent to a multicast address are sent to the entire group of networking devices, such as a
group of routers running the same routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Multicasting

A

When one host sends data to many destination hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

NCP

A

Network Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

netstat -a -b

A

(a) Command used to display the ports currently open on a Windows operating system and (b) used to display
the executable involved in creating the connection or listening port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Network Interface Layer

A

Defines how the host connects to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Non-Internet Routable IP Addresses

A

IP addresses not routed on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Packet Filtering

A

A limit is placed on the information that can enter the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Packet Sniffing

A

A technique in which the contents of data packets are watched (assumes that the attacker can see the
network data packets; performed using a machine attached to the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

PAP

A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

PPP

A

Point-to-Point Protocol (the de facto standard in dial- up VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

PPTP

A

Point to Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Prefix length notation

A

Another shorthand technique for writing the subnet mask except class boundaries are not being crossed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Proxy Server

A

Clients go through a proxy to communicate with secure systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

RIRs

A

Regional Internet registries, IANA-designated governing organizations responsible for IP address
allocation by geographical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

SHA-1

A

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Social Engineering

A

A way for an intruder to obtain enough information from people to gain access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Spoof

A

Inserting a different IP address in place of an IP packet’s source address to make it appear that the
packet came from another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Stateful Friewall

A

Keeps track of the data packet flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Supernets

A

The grouping go two or more class networks together; also called CIDR blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Supernetting

A

Allows multiple networks to be specified by one subnet mask (allows the representation of multiple networks
with one address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

SYN

A

Synchronizing packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

SYN ACK

A

Synchronizing Acknowledgement packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

TCP

A

Transport Control Protocol (example of a connection- oriented protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Transport Layer Protocols

A

Define the type of connection established between hosts and how acknowledgements are sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

UDP

A

User Datagram Protocol; UDP is a connectionless protocol that doesn’t use acknowledgements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Unicast Address

A

Used to identify a single network interface address, and data packets are sent directly to the computer with
the specified IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Virus

A

A piece of malicious computer code that, when opened, can damage your hardware, software, or other
files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Well-known Ports

A

Ports reserved by ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Worm

A

A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

10GBASE-T

A

10Gbps over twisted-pair copper cable (splits the data into 4 channels of 2.5G each) Uses multilevel encoding
to reduce required bandwidth for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

ACR

A

The attention-to-crosstalk ratio measurement compares the signal level from a transmitter at the far
end to the crosstalk measured at the near end. A larger ACR indicates that the cable has a greater data capacity and also indicates the cable’s ability to handle a greater bandwidth. Essentially, it is a combined measurement of the quality of the cable. A higher ACR value (dB) is desirable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Alien Crosstalk (AXT)

A

Unwanted signal coupling from one permanent link to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Attenuation (Insertion Loss)

A

The amount of loss in the signal strength as it propagates down a wire or fiber strand (leakage and
resistance cause attenuation in fiber optic systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Balanced mode

A

Neither wire in the wire pairs connects to ground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Bottlenecking

A

Another term for network congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Building Entrance

A

The point where the external cabling and wireless services interconnect with the internal building cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Campus Network

A

A collection of two or more interconnected LANs in a limited geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

CAT7/7a and CAT6a

A

UTP cable standards that support 10GB data rates for a length of 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Color Map

A

The specification of which wire color connects to which pin on the connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Cross-connect

A

A space where you are going to take one or multiple cables and connect them to one or more cables or
equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Crossover Cable

A

Transmit and receiver wire pairs are crossed (transmit and receive wires crossed, don’t connect to the same
pins on each end)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Crosstalk

A

Signal coupling in a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Delay Skew

A

This is a measure of the difference in arrival time between the fastest and the slowest signal in a UTP
wire pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

EIA

A

Electronic Industries Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

EIA/TIA 568-B

A

The standard that defines the six subsystems of a structured cabling system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

ELTCTL

A

Equal Level Transverse Conversion Transfer Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Entrance Facilities (EF)

A

A room set aside for complex electronic equipement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Equal Level FEXT (ELFEXT)

A

This measurement differs from NEXT in that the measurement is for the far end of the cable. Additionally, the LFEXT measurement does not depend on the length of the cable. This is because ELFEXT is obtained by subtracting the attenuation value from the far-end crosstalk (FEXT!!) loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Equipment Room (ER)/Backbone Cabling

A

Cabling that interconnects telecommunication closets in the same building and between buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

F/UTP

A

Foil over twisted-pair cabling (better security, noise immunity for EMI) It minimizes signal leakage and
provides noise immunity from EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

FastEthernet

A

An Ethernet system operating at 100MBps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Full Channel

A

Consists of all the link elements from the wall plate to the hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Full Duplex

A

Computer system can transmit and receive at the same time (full duplex gigabit Ethernet uses 4 pairs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Gigabit Ethernet / twisted pair cables

A

1000Mbps Ethernet; CAT6 and CAT5e rated for 1000Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Horizontal Cabling

A

Cabling that extends out from the telecommunications closet into the LAN work area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Horizontal Cross-connect (HC)

A

The connection between the building distributors and the horizontal cabling to the work area or workstation
outlet-another term used for the HC is the floor distributors (FD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Hybrid Echo Cancellation Circuit

A

Removes the transmitted signal from the receive signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

IEEE 802.3an-2006 10GBASE-T

A

The standard for 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Intermediate Cross-connect (IC)

A

Also called the building distributor (BD), this is the building’s connection point to the campus backbone.
The IC links the MC to the horizontal cross-connect (HC).

154
Q

LCL

A

Longitudinal Conversion Loss

155
Q

Link

A

Point from one cable termination to another

156
Q

Main Cross-connect (MC)

A

Usually connects two or more buildings and is typically the central telecommunications connects point for a campus or building. It is also called the main distribution frame (MDF) or main equipment room. The MC connects to Telco, and ISP, and so on. Another term for the MC is the campus distributor (CD).

157
Q

Multilevel Encoding

A

Technique used to reduce in the required bandwidth required to transport the data

158
Q

Near-end Crosstalk (NEXT)

A

A measure of the level of crosstalk or signal coupling within the cable, with a high NEXT (dB) value being
desirable.

159
Q

Network Congestion

A

A slowdown on network data traffic movement

160
Q

Nominal Velocity of Propagation (NVP)

A

NVP is some percentage of the velocity of light and is dependent on the type of cable being tested. The typical delay value for CATD/De UTP cable is about 5.7 nsec per meter. The EIA/TIA specification allows for 548 nsec for the maximum 100-meter run for CAT5e, CAT6, CAT6, CAT6a, CAT7, and CAT7A

161
Q

Power Sum NEXT (PSNEXT)

A

The enhanced twisted-pair cable must meet four-pair NEXT requirements, called PSNEXT testing. Basically, power sum testing measures the total crosstalk of all cable pairs. This test ensures that the cable can carry data traffic on all four pairs at the same time with minimal interference. A higher PSNEXT value is desirable because it indicates better cable performance.

162
Q

Propagation Delay

A

This is a measure of the amount of time it takes for a signal to propagate from one end of the cable to the
other. The delay of the signal is affected by the nominal velocity of propagation (NVP) of the cable.

163
Q

PSAACRF

A

Power-Sum Alien Attenuation Cross-talk Ratio Far-End

164
Q

PSACR

A

Power Sum ACR uses all four wire pairs to obtain the measure of the attenuation-crosstalk ratio. This is a measurement of the difference between PSNEXT and attenuation (insertion loss). The difference is measure in dB, and higher PSACR dB values indicate better cable performance.

165
Q

PSANEXT

A

Power-Sum Alien Near-End Crosstalk

166
Q

PSELFEXT

A

Power sum ELFEXT that uses all four wire pairs to obtain a combined ELFEXT performance measurement. This value is the difference between the test signal level and the cross-talk measured at the far end of the cable. A higher PSELFEXT value indicated better cable performance.

167
Q

Return Loss

A

This measurement provides a measure of the ratio of power transmitted into a cable to the amount of power
returned or reflected.

168
Q

RX

A

Abbreviation for receive

169
Q

STP

A

Shielded twisted pair; not good for noisy environments… blocks EMI, has metal foil placed
around the wires

170
Q

Straight-through

A

Transmit and receive signal pairs are aligned end-to- end

171
Q

Straight-through Cable

A

The wire pairs int he cable connect to the same pin numbers on each end.

172
Q

TIA/EIA 568A

A

Wire color guidelines specified under the EIA/TIA568B standard (developed in 1995)

173
Q

T568B

A

Wire color guidelines specified under the EIA/TIA568B standard

174
Q

TCL

A

Transverse Conversion Loss

175
Q

TCO

A

Telecommunications outlet

176
Q

TCTL

A

Transverse Conversion Transfer Loss

177
Q

Telecommunications Closet

A
The location of the cabling termination points that includes the mechanical termination and the
distribution frames (networking equipment, patch cables, backbone cabling, patch panels)
178
Q

TIA

A

Telecommunications Industry Association

179
Q

TR

A

Another name for the telecommunications closet

180
Q

TX

A

Abbreviation for transmit

181
Q

Wire-map

A

A graphical or text description of the wire connections from pin to pin

182
Q

Work Area

A

The location of the computers and printers, patch cables, jacks, computer adapter cables, and fiber
jumpers

183
Q

Workstation or Work Area Outlet (WO)

A

Also called the TO (telecommunications outlet), it’s used to connect devices to the cable plant. The cable type typically used is CAT3, CAT5, CAT5e, CAT6, CAT6A, and various coaxial cables. Devices typically connected to these outlets are PCs, printers, servers, phones, television, and wireless access points.

184
Q

Switch

A

Forwards a frame it receives directly out the port associated with its destination address (get the MAC
addresses form the data packets) Minimize unneeded data traffic, isolate portions of the network

185
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol, the protocol suite used for internetworks such as the
Internet

186
Q

ThinNet

A

A type of coaxial cable used to connect LANs configured with a bus topology

187
Q

Token Passing

A

A technique where an electrical token circulates around a network-control of the token enables the
user to gain access to the network

188
Q

Token Ring Hub

A

A hub that manages the passing of the token in a Token Ring network

189
Q

Token Ring Topology / Network

A

A network topology configured in a logical ring that complements the token passing protocol (one failed station causes network shutdown, difficult to reconfigure, diffident to troubleshoot; each system must relay the token, if there is any failure the entire system goes down. It can be hard to determine which one it is.

190
Q

Topology

A

Architecture of a network

191
Q

Transport Layer (4th layer)

A

Layer of the OSI reference model that is concerned with message integrity between source and destination

192
Q

Uplink Port

A

Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable
(an X label is on the uplink ports)

193
Q

Virtual Private Network (VPN)

A

Establishes a secure network connection and is a way to protect your LAN’s data from being observed by
outsiders

194
Q

Wired Network

A

Uses cables and connectors to establish the network connection

195
Q

Wireless Network

A

Uses radio signal to establish the network connection… wireless signal can be incepted easier than wire
signals

196
Q

Wireless Router

A

Device used to interconnect wireless networking devices and to give access to wired devices and
establish the broadband Internet connection to the ISP

197
Q

Absorption

A

Light interaction with the atomic structure of the fiber material; also involves the conversion of optical power
to heat

198
Q

Chromatic Dispersion

A

The broadening of a pulse due to different propagation velocities of the spectral components of the light pulse
(affects both single mode and multimode fibers)

199
Q

Cladding

A

Material surrounding the core, which must have a lower index of refraction to keep the light in the core

200
Q

Dense Wavelength Division Multiplex (DWDM)

A

Incorporates the propagation of several wavelengths in the 1550-nm range for a single fiber

201
Q

Dispersion

A

Broadening of a light pulse as it propagates through a fiber strand (light isn’t a cause of dispersion, it is
affected by dispersion)

202
Q

Dispersion Compensating Fiber

A

Acts like and equalizer, canceling dispersion effects and yielding close to zero dispersion int he 1550-nm region (developed to increase the transmission capacity of older cabling; allows the use of 1550nm transmission on lines that were designed for 1310nm region)

203
Q

Distributed Feedback (DFB) Laser

A

A more stable laser suitable for use in DWDM systems

204
Q

DL

A

Diode laser

205
Q

Fiber Bragg Grating

A

A short strand of modified fiber that changes the index of refraction and minimized intersymbol
interference

206
Q

Fiber Cross-connect

A

Optical patch panel used to interconnect fiber cables

207
Q

Fiber, Light Pipe, Glass

A

Terms used to describe a fiber-optic strand

208
Q

FTTB

A

Fiber to the business

209
Q

FTTC

A

Fiber to the curb

210
Q

FTTD

A

Fiber to the desktop

211
Q

FTTH

A

Fiber to the home

212
Q

Fusion Splicing

A

A long-term method where two fibers are fused or welded together into one piece of glass

213
Q

GBIC

A

Gigabit interface converter (optical-to-fiber interfaced used at 1 gigabit)

214
Q

Graded-index Fiber

A

The index of refraction is gradually varied with a parabolic profile (overcomes modal dispersion)

215
Q

IC

A

Interconnect fibers branch exchange-item D shows the jumpers connecting the main fiber cross-connect (item
B) to the active equipment (item C)

216
Q

IDC

A

Intermediate distribution closet

217
Q

Index-matching Gel

A

A jellylike substance that has an index of refraction much closer to glass that to air

218
Q

Infrared Light

A

Light extending from 680 nm up to the wavelengths of the microwaves

219
Q

Isolator

A

An inline passive device that allows optical power to flow only in one direction

220
Q

LED

A

Light-emitting diode

221
Q

Logical Fiber Map

A

Shows how the fiber is interconnected and data is distributed throughout a campus (data distribution,
fiber interconnections)

222
Q

Long Haul

A

The transmission of data over hundreds or thousands of miles

223
Q

Macrobending

A

Loss due to light breaking up and escaping into the

cladding

224
Q

Mechanical Splices

A

Two fibers joined together with an air gap, thereby requiring an index-matching gel to provide a good
splice

225
Q

Microbending

A

Loss caused by very small mechanical deflections and stress on the fiber

226
Q

mm

A

Multimode

227
Q

Modal Dispersion

A

The broadening of a pulse due to different path lengths taken through the fiber by different modes

228
Q

Mode Field Diameter

A

The acutal guided optical power distribution, which is typically a micron or so larger thent he core diameter;
single-mode fiber specifications typically list the mode field diameter

229
Q

Multimode Fiber

A

A fiber that supports many optical waveguide modes; use light in the 850 nm and 1310 nm range

230
Q

Numerical Aperture

A

A measure of a fiber’s ability to accept light

231
Q

Optical Ethernet

A

Ethernet data running over a fiber link

232
Q

Optical Spectrum

A

Light frequencies from the infrared on up

233
Q

Physical Fiber Map

A

Shows the routing of the fiber but also shows detail about the terrain, underground conduit, and entries
into buildings

234
Q

Polarization Mode Dispersion

A

The broadening of a pulse due to the different propagation velocities of the X and polarization
components of the light pulse

235
Q

Pulse Dispersion

A

Stretching of received pulse width because of multiple paths taken by the light

236
Q

Received Signal Level (RSL)

A

The input signal level to an optical receiver

237
Q

Refractive Index

A

Ratio of the speed of light in free space to its speed in a given material

238
Q

SC, ST, FC, LC, MT-RJ

A

Typical fiber connectors on the market (need to be easy to install and economical)

239
Q

Scattering

A

Caused by refractive index fluctuations; accounts for 96 percent of attenuation loss

240
Q

Single-mode Fiber

A

Fiber cables with core diameters of about 7-10 um; light follows a single path (use light in the 1310 nm
and 1550 nm range) Uses high-power, highly directional modulated light sources; single-mode fibers are used with lasers.

241
Q

sm

A

Single mode

242
Q

SONET/SDH

A

Synchronous optical network; protocol standard for optical transmission in long-haul
communication/synchronous digital hierarchy

243
Q

STS

A

Synchronous transport signals

244
Q

Tunable Laser

A

Laser in which the fundamental wavelength can be shifted a few nanometers, ideal for traffic routing in
DWDM systems

245
Q

Vertical Cavity Surface Emitting Lasers (VCSELs)

A

Lasers with the simplicity of LEDs and the performance of lasers

246
Q

XENPAK, XPAK, X2, XFP, SFP+

A

The ten gigabit interface adapter

247
Q

Zero-dispersion Wavelength

A

Point where the dispersion is actually zero

248
Q

Aging Time

A

The length of time a MAC address remains assigned to a port; length of time an IP address is assigned to a
switchport

249
Q

ARP Cache

A

Temporary storage of MAC addresses recently contacted

250
Q

ARP Table

A

Another name for the ARP cache

251
Q

Association

A
Indicates that the destination address is for a networking device connected to one of the ports on
the bridge (describes a wireless connection and MAC address: wireless connection has been obtained, provides the client MAC address)
252
Q

AUI Port

A

This is a 10Mbps Ethernet port. AUI stands for “attachment unit interface.”

253
Q

Auto-negotiation

A

Protocol used by interconnected electronic devices to negotiate a link speed (failed negotiation can cause a
link failure, not recommended for fixed data links) The link can only go as fast as the slowest link.

254
Q

Auxiliary Input

A

Used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely
log in to the router if the network is down. This port also uses an RJ-45 connection

255
Q

Bridge

A

A networking device that uses the MAC address to forward data and interconnect two LANs (easy to install) Only forwards data to the specified port, isolates the network traffic, uses MAC addresses to forward data packets. The association tells the bridge where to forward a data packet.

256
Q

Bridging Table

A

List of MAC addresses and port locations for hosts connected to the bridge ports

257
Q

Broadcast

A

Transmission of data by a network device to all devices connected to its ports

258
Q

Broadcast Domain

A

Any network broadcast sent over the network will be seen by all networking devices in this domain

259
Q

Broadcast Storm

A

Excessive amounts of broadcasts; can cause network slowdowns

260
Q

Cisco Network Assistant (CNA)

A

A management software tool from Cisco that simplifies switch configuration and troubleshooting

261
Q

Console Input

A

Provides a RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable uses RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the COM1 or COM2 serial port

262
Q

Content Addressable Memory (CAM)

A

A table of MAC addresses and port mapping used by the switch to identify connected networking devices

263
Q

Cut-Through switching

A

The data packet is forwarded to the destination as soon as the destination MAC address has been read; cut through switching doesn’t read the entire frame,
just the MAC address. Low latency

264
Q

Dynamic Assignment / Addressing

A

MAC addresses are assigned to a port when a host is connected (addresses are assigned dynamically when
using dynamic addressing)

265
Q

Enterprise Network

A

Term used to describe the network used by a large company

266
Q

Error Threshold

A

The point where the number of error in the data packets has reached a threshold and the switch
changes from the cut-through to the store-and- forward mode

267
Q

Fast Link Pulse (FLP)

A

Carries the configuration information between each end of a data link (designed to operate over limited
bandwidth)

268
Q

FastEthernet Port (FA0/0, FA0/1, FA0/2,…)

A

Naming of the FastEthernet ports on the router

269
Q

Flooding

A

The term used to describe what happens when a switch doesn’t have the destination MAC address
stored in CAM

270
Q

Gateway

A

Describes the networking device that enables hosts in a LAN to connect to networks (and hosts) outside the
LAN

271
Q

Half-Duplex

A

The communications device can transmit or receive but not at the same time

272
Q

Isolating the Collision Domains

A

Breaking the network into segments where a segment is a portion of the network where the data traffic from
one part of the network is isolated from the other networking devices

273
Q

Layer 2 Switch

A

An improved network technology that provides a direct data connection for network devices in a LAN

274
Q

Logical Address

A

Describes the IP address location of the network and the address location of the host in the network

275
Q

Managed Switch

A

Allows the network administrator to monitor, configure, and manage select network features
(managed switches can be managed remotely)

276
Q

Media Converter

A

Used to adapt a layer 1 (physical layer) technology to another layer 1 technology

277
Q

Multicast

A

Messages are sent to a specific group of hosts on the network

278
Q

Multilayer Switch (MLS)

A

Operates at layer 2 but functions at the higher layers

279
Q

Multiport Bridge

A

Another name for a layer 2 switch

280
Q

Network Address

A

Another name for the layer 3 address (routers use the network address to route packets)

281
Q

Network Slowdown

A

Degraded network performance

282
Q

Power On/Off

A

Turns on/off electrical power to the router

283
Q

Router Interface

A

The physical connection where the router connects to the network; serial, ethernet, and auxiliary can all be
used to connect to the network.

284
Q

Routing Table

A

Keeps track of the routes to use for forwarding data to its destination

285
Q

Secure Address

A

The switch port will automatically disable itself if a device with a different MAC address connects to the
port

286
Q

Serial Port (S0/0, S0/1, So/2,…)

A

Naming of the serial ports on the router

287
Q

Serial Ports

A

Provides a serial data communication link into and out of the router, using V.35 serial interface cables

288
Q

Store-and-Forward

A

The entire frame of data is received before any decision is made regarding forwarding the data packet
to its destination

289
Q

Switch Latency

A

The length of time a data packet takes from the time it enters a switch until it exists

290
Q

Translation Bridge

A

Used to interconnect two LANs that are operating two different networking protocols

291
Q

Transparent Bridge

A

Interconnects two LANs running the same type of protocol

292
Q

Wire Speed Routing

A

Data packets are processed as quickly as they arrive

293
Q

Access Point

A

A transceiver used to interconnect a wireless and a wired LAN (looks at the SSID to determine if the data
packet is intended for its network)

294
Q

Ad Hoc

A

Another term used to describe an independent network

295
Q

Backscatter

A

Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source

296
Q

Basic Service Set (BSS)

A

Term used to describe an independent network

297
Q

Beacon

A

Used to verify the integrity of a wireless link

298
Q

BWA

A

Broadband wireless access

299
Q

CSMA/CA

A

Carrier sense multiple access/collision avoidance

300
Q

DSSS

A

Direct sequence spread spectrum

301
Q

Extended Service Set (ESS)

A

The use of multiple access points to extend user mobility (allows a wider range of wireless signals using
roaming)

302
Q

FHSS

A

Frequency hopping spread spectrum

303
Q

Hand-off

A

When the user’s computer establishes an association with another access point

304
Q

Hopping Sequence

A

The order of frequency changes

305
Q

Inquiry Procedure

A

Used by Bluetooth to discover other Bluetooth devices or to allow itself to be discovered

306
Q

ISM

A

Industrial, scientific, and medical

307
Q

Last Mile

A

The last part of the connection from the telecommunications provider to the customer

308
Q

MIMO

A

A space-division multiplexing technique where the data stream is split into multiple parts called spatial
streams (uses space-division multiplexing to transmit different data streams in parallel)

309
Q

NLOS

A

Non-line-of-sight

310
Q

OFDM

A

Orthogonal frequency division multiplexing

311
Q

Paging Procedure

A

Used to establish and synchronize a connection between two Bluetooth devices

312
Q

Pairing

A

When a Bluetooth device is set up to connect to another Bluetooth device

313
Q

Passkey

A

Used in Bluetooth Security to limit outsider access to the pairing

314
Q

Piconet

A

An ad hoc network of up to eight Bluetooth devices

315
Q

Pseudorandom

A

The number sequence appears random but actually repeats

316
Q

Radio Frequency Identification (RFID)

A

A technique that uses radio waves to track and identify people, animals, objects, and shipments (full speed
tollbooths, tracking shipments, border crossings) Parameters that define an RFID system is frequency of operation, power, and protocol

317
Q

RADIUS

A

Remote Authentication Dial-In User Service (prevents unauthorized users to connect to the network as well as preventing users form connecting to rogue access
points)

318
Q

Roaming

A

The term used to describe a user’s ability to maintain network connectivity as he moves through the
workplace

319
Q

Site Survey

A

Performed to determine the best location(s) for placing the access point(s) to provide maximum RF coverage
for the wireless clients (conducted both inside and outside)

320
Q

Slotted Aloha

A

A wireless network communications protocol technique similar to the Ethernet protocol

321
Q

Transceiver

A

A transmit/receive unit

322
Q

U-NII

A

Unlicensed National Information Infrastructure

323
Q

Wi-Fi

A

Wi-Fi Alliance(md) and organization that tests and certifies wireless equipment for compliance with the
802.11x standards

324
Q

WiMAX

A

A broadband wireless system based on the IEEE 802.16e standard (30 miles max range)

325
Q

WLAN

A

Wireless local area network

326
Q

WPA

A

Wi-Fi Protected Access

327
Q

The Transport Layer (4th layer)

A

The transport layer protocols in TCP/IP are very important in establishing a network connection, managing the delivery of data between a source and destination host, and terminating the data connection (TCP and UDP are the only protocols on the Transport layer).

328
Q

HTTP Port Number

A

80

329
Q

Bluetooth

A

Operates in the 2.4 GHz band; 802.11n, 802.11b, 802.11g (802.11a operates in the 5Gz range)

330
Q

Core size of multimode cables

A

62.5

331
Q

Patch Cable

A

Used to make the physical connection to the wall plate

332
Q

Stretching of a received pulse is due to

A

Pulse-dispersion and Multiple paths taken by the light waves

333
Q

EIA/TIA568-B.2 and 568-2.1

A

specify the cabling components and transmission of copper cabling hardware

334
Q

10.10.20.250

A

Example of a private IP address, a nonroutable Internet IP address, Class A address

335
Q

Antivirus software

A

Signatures or definitions contain traits of the specific virus or worm

336
Q

MAC address filtering

A

Only devices with specified layer 2 addresses will be allowed to access the network… lets you specify which
devices can connect to the network

337
Q

10101010

A

Provide MAC functions to allow users to connect to each other; provides 802.11 MAC layer functions

338
Q

Cisco LEAP

A

User must provide the correct password

339
Q

Router Routing tables

A

Keep track of the addresses needed to route data. Contains addresses of adjacent routers and the
networks that they can reach. It also includes the metric and method of learning the route. Use the ip route command to the the routing table.

340
Q

Maximum length for multimode fiber optic cable

A

2000 meters or 2 km

341
Q

Wired networks

A

Can have data rates as high as 100Gbps

342
Q

no ip directed-broadcast network command

A

Prevents networks from becoming intermediate sites for network attacks. On a Cisco router prevents a
network form becoming an intermediate site for a network attack

343
Q

Hexadecimal equivalent of 1011

A

B = 1011 = 11

344
Q

Serial Interface

A

Used to create a T1 connection; sometimes has a built-in CSU/DSU

345
Q

802.11 technologies

A

Don’t use visible light; use FHSS, DSSS, infrared

346
Q

Secure a wireless home network

A

Turn on encryption; turning on WEP, WPA or WPA-2 will encrypt the data

347
Q

Class C usable IP network addresses

A

192.0.0.0 - 223.255.255.255 (there are 24 network bits; the first three octets are used with 24 bits total)

348
Q

150.25.191.255

A

broadcast address for 150.25.151.68 with a mask of 255.255.192.0

349
Q

How many wire pairs are used for gigabit Ethernet

A

4: all 4 wire pairs are used for transmission at 1 Gbps speeds

350
Q

Wireless security guidelines

A

Use firewalls, turn on access point security features. Technology in any frequency band may be used and
3rd party tools must be used end-to-end.

351
Q

Network Segment

A

A segment is associated with each networking device; the networking link between 2 LANs

352
Q

Intrusion detection

A

the monitoring of data packets passing through the network to catch potential attacks; the monitoring of
data packets passing through the network to catch ongoing attacks. The first issue of intrusion is Social Engineering.

353
Q

Private IP address

A

Cannot be used on the Internet, only Intranets

354
Q

OC-3 bit rate

A

155.52 Mbps

355
Q

UTP wire pair length difference

A

can be due to poor manufacturing, can be due to inconsistent twists, cause the cable not to be certified… cable testing will reveal these issues. The inconsistent length can cause failure if one wire is over 100 meters while the others are not. Due to the difference in the cable twists for each wire pair.

356
Q

255.255.255.224

A

Expressed as a /27 using CIDR notation because there are 27 1s in the subnet mask

357
Q

192.168.55.0 dived into multiple subnets, need at lest 30 host ID’s in each subnet; maximum number of subnets you could have?

A

8: Class C address and we must use 5 bits for our hosts (2 to the 5th -2 = 30 hosts). That leaves 3 bits to use for subnets. 2 to the 3rd = 8 subnets.

358
Q

Probing

A

Indicators of repeated attempts to make connections to certain machines

359
Q

Core

A

Carries the light signals in a fiber optic cable

360
Q

Static assignment

A

MAC address that has been manually assigned

361
Q

SMTP Port Number

A

25

362
Q

Router

A

Interconnect LANs; routers know where to send packets coming into or leaving the LAN; router ports
commonly refereed to as interfaces which provide the physical connection to the network

363
Q

Ethernet (DIX) frame after the Preamble

A

Destination address, Source address, Type/Length, Data, Pad, FCS

364
Q

Fiber optic communication system

A

Source, cable, connectors, photodiode… the link may have splices but it must have connectors

365
Q

255.255.252.0

A

Expressed as /22 using CIDR notation becasue there are 22 1s in the subnet mask

366
Q

Well-known ports

A

ICANN reserves these ports for particular protocols

367
Q

SYN Flood

A

Attackers send SYN packets to set up virtual connections that use up the connection buffer…
denial-of-service attack characterized by using all connections available on a computer

368
Q

How many usable host IP addresses are provided: network IP address of 192.168.12.0 and a subnet
mask of 255.255.255.252

A

2

369
Q

Telnet Port

A

23

370
Q

DSL Modem

A

Used to connect to a broadband network through your telephone connection only. Broadband modems can
connect using cable or telephone technology.

371
Q

Physical Architecture of a computer network

A

Topologies, A physical topology is the actual layout of the network.

372
Q

SLA ID

A

Used to identify subnets in an IPv6 address

373
Q

802.11u

A

802.11x standard increases security by incorporating user authentication, not 802.11u

374
Q

Correct order sequence of packets that are sent to set up a virtual TCP connection

A

The three-way handshake is used to create virtual TCP connections: SYN, SYN-ACK, ACK

375
Q

802.11g advantage

A

Compatible with 802.11b, high speed

376
Q

What tools are needed to make a UTP cable?

A

Crimping Tool and strippers are used to terminate UTP cables

377
Q

FTP Port Number

A

21

378
Q

Layered Protocol Specifications

A

Multi vendor interoperability, easier to develop, easier to learn; Multivendor engineering not a benefit because doesn’t specify how it should work, just what it needs to be able to do.

379
Q

Designing a LAN

A
  1. document all devices 2. develop and addressing scheme, physically connect devices and configure
    devices to communicate
380
Q

With an address of 197.15.22.31 and a subnet mask of 255.255.255.224 how many bits have been borrowed to create a subnet?

A
  1. 224 = 11100000, 3 bits on
381
Q

Light detector characteristics

A

Responsitivity, response speed, spectral response

382
Q

Decimal equivalent of 11110000

A

11110000 = 240