Ethernet Fundamentals Flashcards
In 10BASE-T, the T means that the the network uses _______________, the 10 means _______________.
Unshielded Twisted Pair
Maximum speed of 10 Mbps
When considering how devices access the network, there are two categories _______________ and _______________.
Deterministic
Convention-based
_______________ networks are very organized and orderly, need a token to transmit.
Deterministic
_______________ networks are very chaotic, devices transmit whenever they want.
Contention-based
CSMA/CD stands for _______________.
Carrier Sense Multiple Access/ Collision Detect
The CS in CSMA/CD stands for _______________.
carrier sense
The MA in CSMA/CD stands for _______________.
multiple access
The CD in CSMA/CD stands for _______________.
collision detect
Ethernet devices transmit using _______________, which means they listen to the wire and verify it is not busy.
carrier sense
_______________ means that all network devices have access at any time.
multiple access
Using _______________, if two devices transmit at the same time which causes a collision, the devices will back off, wait a random time, and try again.
collision detect
_______________ are comprised of all devices on a shared Ethernet segment (everything on the same cable or hub).
Collision Domains
Devices on a Collision Domain all operate at _______________ when connected to a hub (layer 1 device).
half-duplex
Devices on a Collision Domain must all _______________ before they transmit to avoid collisions when operating as CSMA/CD.
listen
Ethernet switches increase scalability of networks by creating multiple _______________.
collision domains
Each _______________on a switch is a collision domain, no chance of collision and increased speeds.
port
Switches can operate in _______________ mode.
full-duplex
_______________ is the measure of how many bits the network can transmit in 1-second.
Bandwidth
The type of _______________ determines the bandwith capability of the network.
cable
Ethernet networks have a _______________ bandwith capacity.
10 Mbps
Fast Ethernet networks have a _______________ bandwidth capacity.
100 Mbps
Gigabit Ethernet networks have a _______________bandwith capacity.
1000 Mbps
10BASE-T uses _______________ or higher cable and has a bandwidth of ______________.
Cat 3
10 Mbps
100BASE-TX uses _______________or higher cable and has a bandwidth of _______________.
Cat 5
100 Mbps
1000BASE-TX uses _______________ or higher cable and has a bandwith of _______________.
Cat 6
1 Gbps
1000BASE-SX uses _______________ fiber and has a bandwidth of _______________.
MMF
1 Gbps
1000BASE-ZX uses _______________ fiber and has a bandwith of _______________.
SMF
1 Gbps
A ___________________ is also known as a multiport repeater.
hub
A ___________________ repeates signal with no amplification.
passive hub
An ___________________ repeats signal with amplification.
active hub
A ___________________ is an active hub with enahanced features like SNMP.
smart hub
When using hubs each ___________________ is a collision domain.
LAN segment
When using two hubs to connect two LAN segments together, how many collision domains are created?
Just one, the entire network is a collision domain.
___________________ analyze source MAC addresses in frames entering it and poplutate an internat MAC address table.
Bridges
___________________ make intelegent forawarding decisions based on destination MAC address in the frames.
Bridges
A ___________________ used between two LAN segments using hubs creates two collision domains.
bridge
A bridge between two or more LAN segments using hubs creates how many broadcast domains?
1
A switch is a Layer ___________________ device.
2
When a device on a network using a switch wants to talk to another device on the network, it sends out an ___________________ request.
ARP
A ___________________ is a layer 3 device used to connect multiple networks together.
router
Routers make forwarding decisions on logical network address information such as ___________________ .
IP addresses
Each port on a router is a separate ___________________ and ___________________.
collision domain
broadcast domain
A ___________________ can be used to connect multiple networks together, make layer 3 routing decsisions and enterconnect entire networks (like a router), not just network segments (like a switch).
Layer 3 Switch
_______________ allows for combination of multiple physical connections into a single logical connection. With this, the bandwidth available is increased and the congestion is minimized or prevented.
Ling Aggregation (802.3ad)
802.3ad stands for _______________.
Link Aggregation
Link Aggreations let’s you use more _______________on the switch to give you greater bandwidth.
ports
_______________ and _______________ provide electrical power over Ethernet.
PoE 802.3af
PoE+ 802.3at
PoE 802.3af provides _______________ of power to a device.
15.4 watts
PoE 802.3at provides _______________of power to a device.
25.5 watts
When it comes to power over Ethernet there are two types of devices, _______________ and _______________.
Power Sourcing Equipment (PSE) Powered Device (PD)
The most common type of PSE is a ______________.
powered switch
If you set up _______________ or _______________ on a switch, you can hook up a packet sniffer into an open port that you configure, and analyze packet flow over a network. As it makes a copy of all traffic destined for a port and sends it to another port.
Port monitoring or mirroring
802.1x stands for _______________.
User Authentication
For security purposes, switches can require users to authenticate themselves before gaining access to the network, with _______________ allows it to do.
user authentication
Once user authentication is done, a _______________ is generated and shared between the supplicant (device wanting access) and the switch (authenticator).
key
The _______________ verifies the credentials from the supplicant.
authentication server
To configure and manage switches you can use _______________ or the _______________.
SSH
Console port
It is more secure to manage a switch _______________.
locally (console port)
_______________ involves keeping all network configuration devices on a separate network.
Out-of-band (OOB) management
_______________ uses the Hot Standby Router Protocol (HSRP) that uses virtual IP and MAC addresses to provide an “active router” and a “standby router”.
First-Hop Redundancy
_______________ permits or denies traffic based on a devices MAC address to improve security.
MAC Filtering
_______________ is used by multilayer switches or routers to permit or deny traffic based on IP addresses or application ports.
Traffic Filtering
_______________ is used to forward traffic based on priority markings.
Quality of Service (QoS)
802.1D is the _______________ protocol.
Spanning Tree Protocol (STP)
_______________ permits redunant links between switches and prevents looping of network traffic.
Spanning Tree Protocol (STP) (802.1D)
_______________ is used instead of STP for larger network environments.
Shortest Path Bridging (SPB)
Without STP _______________ corruption can occur. This causes a _______________.
MAC address table
Broadcast storm
A _______________ occurs if a frame is received by both switches, they can forward frame to each other. Multiple copies of the frame are forwarded, replicated, and forwarded again until the network is consumed with the forwarding of many copies of the same initial frame.
Broadcast Storm
STP uses a _______________ and _______________ bridges to create a loop free network when connecting LAN segments.
root and non-root
The root bridge is the switch that has the lowest-numbered _______________, or has the highest _______________. All the other switches become non-root bridges.
MAC address
Priority
Every non-root bridge has a single _______________, this is the port closest to the root bridge in terms of cost. If costs are equal the lowest port number is used. (faster cables have a lower cost, slower cables have a higher cost).
root port
Every network segment has a _______________, this is the port closest to the root bridge in terms of cost.
designated port
All ports on a root bridge are _______________.
designated ports
_______________ are ports that block traffic to create a loop-free topology.
non-designated ports
Non-designated ports do not forward traffic during normal operation, but do receive _______________, which are used at beginniing and on redunant links.
bridge protocol data units (BPDUs)
802.1q is ____________________.
VLAN Trunking
VLANs are each tagged with a _______________ identifier.
4-byte
The TPI of a VLAN is the _______________.
Tag Protocol Identifier
The TCI of a VLAN is the _______________.
Tag Control Identifier
When you have one VLAN and it is left untagged it becomes the Native VLAN or VLAN _______________.
VLAN 0
A _______________ creates a secure, virtual network over an untrusted network, like the Internet.
Virtual Private Network (VPN)
One of the devices that can terminate VPN tunnels is a _______________, althogh firewalls can also perform this function.
VPN concentrator
_______________ are a network security appliance that are placed at the boundary of your network.
Firewalls
Firewalls can be either _______________ or _______________.
software or hardware
_______________ firewalls allow traffic that originates from inside the network and goes out to the Internet and blocks traffic originating from the Internet from getting into the network.
Stateful Firewalls
A _________________________ conducts deep packet inspection at Layer 7, detects and prevents attacks, and is much more powerful than basic stateless or statefull firewalls.
Next-Generation Firewall (NGFW)
A NGFW continually connects to the _______________ resources for the latest information on threats.
cloud
An _______________ recognizes attacks through signatures and anomalies, can be host and network based devices.
Intrusion Detection System (IDS)
An _______________ recognizes and responds to attack, can be host and network based devices.
Intrusion Prevention System (IPS)
A _______________ is a domain name under a Top-Level Domain and represents a web, mail, or file server. service.domain.top-level domain
Fully-Qualified Domain Name (FQDN)
A _______________ contains the FQDN with method of accessing information (ex. https://www.DionTraining.com)
Uniform Resource Locator (URL)
A DNS _______________ record is the address record for IPv4 addresses. Says dion.training is 666.333.334 etc.
A
A DNS _______________ record is the address record for IPv6 addresses.
AAAA
A DNS _______________ record is the canonical name, the alias for existing record; diontraining.com = www.diontraining.com
CNAME
A DNS _______________ record is the mail exchange record that maps domain name to the email server.
MX
A DNS _______________ record denotes the authoritative name server for the domain. Tells DNS which DNS server is the authoritative source for your IP address.
NS
_______________ automates the process so the majority of devices on a network automatically receive IP addresses, subnet masks, default gateways, and DNS server addresses.
Dynamic Host Configuration Protocol (DHCP)
What are the four steps of DHCP?
Discover
Offer
Request
Acknowledge
A _______________ is a specialized device that makes a request to an external network on behalf of a client. It is used for security to perform content filtering and logging. The middle man between device and Internet.
Proxy Server
A _______________ is a dedicated appliance that performs the caching functions of a proxy server and is more efficient than a proxy server. Good to use at a branch location that has a smaller pipe.
Content Engine (Cashing Engine)
_______________ distributes incoming requests across the various servers in the server farm. Also known as _______________ .
Content Switches (Load Balancers)