Ch6 The Basic LAN Flashcards
___ filter and forward data based on MAC addresses
switches
MAC addresses are part of layer ___ of the network
2
a ___ involves splitting a Domain and assigning the parts to different ports
VLAN
switches are generally equipped with ___ guarding, which mitigate against the danger of ___
flood; bridge loops
___ Protocol was developed to prevent bridge loops, but must be enabled in the ___ interface
Spanning Tree Protocol (STP); switch
___ filter and forward data based on IP Addresses
routers
___ could also be called layer 3 switches
routers
a router is the interface between different ___
network ID’s
a router connecting a LAN to the Internet is called a ___
Gateway router
because a router assigns private IP addresses to all the devices on a LAN, it will always be running ___
Network Address Translation (NAT)
because a gateway router is interfacing with the Internet, it will have a ___
firewall
in a LAN, computers are connected to create a ___
Broadcast Domain
two or more LAN’s connected form a ___
Wide Area Network (WAN)
several LAN’s and WAN’s connected within a city form a ___
Metropolitan Area Network (MAN)
the protocol underlying both the internet and LAN’s is ___
TCP/IP
when a LAN has two routers, one facing the internet and the other interfacing the rest of the network, the space between them is called a ___
Demilitarized Zone (DMZ)
a Wireless Access Point (WAP) assigns an ___ to every device (cellphone, laptop, etc.) connected to it
Service Set Identifier (SSID)
an ___ network is completely isolated from the outside world
Air-Gapped
the foundation of most protocols, originally designed for Dial-Up connections but still used extensively is ___
Point to Point Protocol (PPP)
the ___ protocol, originally an extension to PPP that just does authentication and has several versions
Extensible Authentication Protocol (EAP)
the EAP protocol ___ hashes passwords, and is identical to Microsoft’s MSCHAP
EAP-MD5
the EAP protocol ___ uses pre-determined symmetric keys
EAP-PSK
the EAP protocol ___ requires server and client certificates, allowing it to use more modern encryption
EAP-TLS
the EAP protocol ___ uses the TLS encryption, but only the Server needs a certificate
EAP-TTLS