Ethernet Fundamentals Flashcards

1
Q

In 10BASE-T, the T means that the the network uses _______________, the 10 means _______________.

A

Unshielded Twisted Pair

Maximum speed of 10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When considering how devices access the network, there are two categories _______________ and _______________.

A

Deterministic

Convention-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______________ networks are very organized and orderly, need a token to transmit.

A

Deterministic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______________ networks are very chaotic, devices transmit whenever they want.

A

Contention-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSMA/CD stands for _______________.

A

Carrier Sense Multiple Access/ Collision Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The CS in CSMA/CD stands for _______________.

A

carrier sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The MA in CSMA/CD stands for _______________.

A

multiple access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The CD in CSMA/CD stands for _______________.

A

collision detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethernet devices transmit using _______________, which means they listen to the wire and verify it is not busy.

A

carrier sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______________ means that all network devices have access at any time.

A

multiple access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using _______________, if two devices transmit at the same time which causes a collision, the devices will back off, wait a random time, and try again.

A

collision detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______________ are comprised of all devices on a shared Ethernet segment (everything on the same cable or hub).

A

Collision Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Devices on a Collision Domain all operate at _______________ when connected to a hub (layer 1 device).

A

half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Devices on a Collision Domain must all _______________ before they transmit to avoid collisions when operating as CSMA/CD.

A

listen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethernet switches increase scalability of networks by creating multiple _______________.

A

collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each _______________on a switch is a collision domain, no chance of collision and increased speeds.

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Switches can operate in _______________ mode.

A

full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_______________ is the measure of how many bits the network can transmit in 1-second.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The type of _______________ determines the bandwith capability of the network.

A

cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ethernet networks have a _______________ bandwith capacity.

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fast Ethernet networks have a _______________ bandwidth capacity.

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Gigabit Ethernet networks have a _______________bandwith capacity.

A

1000 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

10BASE-T uses _______________ or higher cable and has a bandwidth of ______________.

A

Cat 3

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

100BASE-TX uses _______________or higher cable and has a bandwidth of _______________.

A

Cat 5

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

1000BASE-TX uses _______________ or higher cable and has a bandwith of _______________.

A

Cat 6

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1000BASE-SX uses _______________ fiber and has a bandwidth of _______________.

A

MMF

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

1000BASE-ZX uses _______________ fiber and has a bandwith of _______________.

A

SMF

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A ___________________ is also known as a multiport repeater.

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A ___________________ repeates signal with no amplification.

A

passive hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An ___________________ repeats signal with amplification.

A

active hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A ___________________ is an active hub with enahanced features like SNMP.

A

smart hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When using hubs each ___________________ is a collision domain.

A

LAN segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When using two hubs to connect two LAN segments together, how many collision domains are created?

A

Just one, the entire network is a collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

___________________ analyze source MAC addresses in frames entering it and poplutate an internat MAC address table.

A

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

___________________ make intelegent forawarding decisions based on destination MAC address in the frames.

A

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A ___________________ used between two LAN segments using hubs creates two collision domains.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A bridge between two or more LAN segments using hubs creates how many broadcast domains?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A switch is a Layer ___________________ device.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When a device on a network using a switch wants to talk to another device on the network, it sends out an ___________________ request.

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A ___________________ is a layer 3 device used to connect multiple networks together.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Routers make forwarding decisions on logical network address information such as ___________________ .

A

IP addresses

42
Q

Each port on a router is a separate ___________________ and ___________________.

A

collision domain

broadcast domain

43
Q

A ___________________ can be used to connect multiple networks together, make layer 3 routing decsisions and enterconnect entire networks (like a router), not just network segments (like a switch).

A

Layer 3 Switch

44
Q

_______________ allows for combination of multiple physical connections into a single logical connection. With this, the bandwidth available is increased and the congestion is minimized or prevented.

A

Ling Aggregation (802.3ad)

45
Q

802.3ad stands for _______________.

A

Link Aggregation

46
Q

Link Aggreations let’s you use more _______________on the switch to give you greater bandwidth.

A

ports

47
Q

_______________ and _______________ provide electrical power over Ethernet.

A

PoE 802.3af

PoE+ 802.3at

48
Q

PoE 802.3af provides _______________ of power to a device.

A

15.4 watts

49
Q

PoE 802.3at provides _______________of power to a device.

A

25.5 watts

50
Q

When it comes to power over Ethernet there are two types of devices, _______________ and _______________.

A
Power Sourcing Equipment (PSE)
Powered Device (PD)
51
Q

The most common type of PSE is a ______________.

A

powered switch

52
Q

If you set up _______________ or _______________ on a switch, you can hook up a packet sniffer into an open port that you configure, and analyze packet flow over a network. As it makes a copy of all traffic destined for a port and sends it to another port.

A

Port monitoring or mirroring

53
Q

802.1x stands for _______________.

A

User Authentication

54
Q

For security purposes, switches can require users to authenticate themselves before gaining access to the network, with _______________ allows it to do.

A

user authentication

55
Q

Once user authentication is done, a _______________ is generated and shared between the supplicant (device wanting access) and the switch (authenticator).

A

key

56
Q

The _______________ verifies the credentials from the supplicant.

A

authentication server

57
Q

To configure and manage switches you can use _______________ or the _______________.

A

SSH

Console port

58
Q

It is more secure to manage a switch _______________.

A

locally (console port)

59
Q

_______________ involves keeping all network configuration devices on a separate network.

A

Out-of-band (OOB) management

60
Q

_______________ uses the Hot Standby Router Protocol (HSRP) that uses virtual IP and MAC addresses to provide an “active router” and a “standby router”.

A

First-Hop Redundancy

61
Q

_______________ permits or denies traffic based on a devices MAC address to improve security.

A

MAC Filtering

62
Q

_______________ is used by multilayer switches or routers to permit or deny traffic based on IP addresses or application ports.

A

Traffic Filtering

63
Q

_______________ is used to forward traffic based on priority markings.

A

Quality of Service (QoS)

64
Q

802.1D is the _______________ protocol.

A

Spanning Tree Protocol (STP)

65
Q

_______________ permits redunant links between switches and prevents looping of network traffic.

A

Spanning Tree Protocol (STP) (802.1D)

66
Q

_______________ is used instead of STP for larger network environments.

A

Shortest Path Bridging (SPB)

67
Q

Without STP _______________ corruption can occur. This causes a _______________.

A

MAC address table

Broadcast storm

68
Q

A _______________ occurs if a frame is received by both switches, they can forward frame to each other. Multiple copies of the frame are forwarded, replicated, and forwarded again until the network is consumed with the forwarding of many copies of the same initial frame.

A

Broadcast Storm

69
Q

STP uses a _______________ and _______________ bridges to create a loop free network when connecting LAN segments.

A

root and non-root

70
Q

The root bridge is the switch that has the lowest-numbered _______________, or has the highest _______________. All the other switches become non-root bridges.

A

MAC address

Priority

71
Q

Every non-root bridge has a single _______________, this is the port closest to the root bridge in terms of cost. If costs are equal the lowest port number is used. (faster cables have a lower cost, slower cables have a higher cost).

A

root port

72
Q

Every network segment has a _______________, this is the port closest to the root bridge in terms of cost.

A

designated port

73
Q

All ports on a root bridge are _______________.

A

designated ports

74
Q

_______________ are ports that block traffic to create a loop-free topology.

A

non-designated ports

75
Q

Non-designated ports do not forward traffic during normal operation, but do receive _______________, which are used at beginniing and on redunant links.

A

bridge protocol data units (BPDUs)

76
Q

802.1q is ____________________.

A

VLAN Trunking

77
Q

VLANs are each tagged with a _______________ identifier.

A

4-byte

78
Q

The TPI of a VLAN is the _______________.

A

Tag Protocol Identifier

79
Q

The TCI of a VLAN is the _______________.

A

Tag Control Identifier

80
Q

When you have one VLAN and it is left untagged it becomes the Native VLAN or VLAN _______________.

A

VLAN 0

81
Q

A _______________ creates a secure, virtual network over an untrusted network, like the Internet.

A

Virtual Private Network (VPN)

82
Q

One of the devices that can terminate VPN tunnels is a _______________, althogh firewalls can also perform this function.

A

VPN concentrator

83
Q

_______________ are a network security appliance that are placed at the boundary of your network.

A

Firewalls

84
Q

Firewalls can be either _______________ or _______________.

A

software or hardware

85
Q

_______________ firewalls allow traffic that originates from inside the network and goes out to the Internet and blocks traffic originating from the Internet from getting into the network.

A

Stateful Firewalls

86
Q

A _________________________ conducts deep packet inspection at Layer 7, detects and prevents attacks, and is much more powerful than basic stateless or statefull firewalls.

A

Next-Generation Firewall (NGFW)

87
Q

A NGFW continually connects to the _______________ resources for the latest information on threats.

A

cloud

88
Q

An _______________ recognizes attacks through signatures and anomalies, can be host and network based devices.

A

Intrusion Detection System (IDS)

89
Q

An _______________ recognizes and responds to attack, can be host and network based devices.

A

Intrusion Prevention System (IPS)

90
Q

A _______________ is a domain name under a Top-Level Domain and represents a web, mail, or file server. service.domain.top-level domain

A

Fully-Qualified Domain Name (FQDN)

91
Q

A _______________ contains the FQDN with method of accessing information (ex. https://www.DionTraining.com)

A

Uniform Resource Locator (URL)

92
Q

A DNS _______________ record is the address record for IPv4 addresses. Says dion.training is 666.333.334 etc.

A

A

93
Q

A DNS _______________ record is the address record for IPv6 addresses.

A

AAAA

94
Q

A DNS _______________ record is the canonical name, the alias for existing record; diontraining.com = www.diontraining.com

A

CNAME

95
Q

A DNS _______________ record is the mail exchange record that maps domain name to the email server.

A

MX

96
Q

A DNS _______________ record denotes the authoritative name server for the domain. Tells DNS which DNS server is the authoritative source for your IP address.

A

NS

97
Q

_______________ automates the process so the majority of devices on a network automatically receive IP addresses, subnet masks, default gateways, and DNS server addresses.

A

Dynamic Host Configuration Protocol (DHCP)

98
Q

What are the four steps of DHCP?

A

Discover
Offer
Request
Acknowledge

99
Q

A _______________ is a specialized device that makes a request to an external network on behalf of a client. It is used for security to perform content filtering and logging. The middle man between device and Internet.

A

Proxy Server

100
Q

A _______________ is a dedicated appliance that performs the caching functions of a proxy server and is more efficient than a proxy server. Good to use at a branch location that has a smaller pipe.

A

Content Engine (Cashing Engine)

101
Q

_______________ distributes incoming requests across the various servers in the server farm. Also known as _______________ .

A

Content Switches (Load Balancers)