Ethernet Fundamentals Flashcards

1
Q

Deterministic Network

A

Medium that is very organized, orderly and requires an electronic token to transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Contention-based Network

A

Medium that is very chaotic and can transmit whenever possible. Can cause collisions. Used by Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

Prevents collisions by using carrier-sensing to defer transmissions until no other stations are transmitting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Collision Domain

A

Each are of the network that shares a single segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet Switch

A

Increases scalability of a network by creating multiple collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAT 3

A

10BASE-T
10 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CAT 5e

A

1000BASE-T
1000 Mbps
100meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CAT 5

A

100BASE-TX
100 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAT 6

A

1000BASE-T / 10GBASE-T
1000 Mbps / 10 Gbps
100 meters / 55 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAT 6a

A

10GBASE-T
10 Gbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAT 7

A

10GBASE-T
10 Gbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAT 8

A

40GBASE-T
40 Gbps
30 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bandwidth

A

Measures how many bits the network can transmit per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

100BASE-FX

A

MMF
100 Mbps
2 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

100BASE-SX

A

MMF
100 Mbps
300 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1000BASE-SX

A

MMF
1000 Mbps
220-550 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1000BASE-LX

A

SMF / MMF
1000 Mbps
5 kilometers / 550 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

10GBASE-SR

A

MMF
10 Gbps
400 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

10GBASE-LR

A

SMF
10 Gbps
10 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

10BASE-T

A

10 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bandwidth

A

Measures how many bits the network can transmit per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hub

A

Also known as a multiport repeater, it is a Layer 1 device that connects multiple network devices and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bridge

A

Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC in the frames.

24
Q

Switch

A

Also known as a multiport bridge, it is a Layer 2 device that connects multiple network segments together. Focused on MAC addresses.

25
Router
Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information. Focused on IP addresses.
26
Layer 3 Switch
Makes Layer 3 routing decisions and then interconnects entire networks, not just network segments.
27
Link Aggregation (IEEE 802.3ad)
Combines multiple physical connections into a single logical connection to minimize or prevent congestion.
28
Power Over Ethernet PoE 802.3af PoE+ 802.3at
Supplies electrical power over ethernet and requires CAT 5 or higher copper cable. PoE 802.3af - Up to 15.4 watts PoE+ 802.3at - Up to 25.5 watts
29
Port Monitoring or Mirroring
Makes a copy of all traffic destined for a port and sends it to another port.
30
User Authentication (802.1x)
Requires users to authenticate themselves before gaining access to the network.
31
Secure Shell (SSH)
Remote administration program that allows connection to the switch over a network.
32
Console Port
Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45).
33
Out-of-band (OOB) Management
Keeps all network configuration devices on a separate network.
34
First-Hop Redundancy
Uses Hot Standby Router Protocol (HSRP) to create virtual IP and MAC addresses to provide active and standby routers.
35
MAC Filtering
Permits or denies traffic based on a device's MAC address.
36
Traffic Filtering
Permits or denies traffic based on IP addresses or application ports.
37
Quality of Services (QoS)
Forwards traffic based on priority markings.
38
Spanning Tree Protocol (802.1d)
Permits redundant links between switches and prevents looping of network traffic.
39
Shortest Path Bridging (SPB)
Used instead of STP for larger network environments.
40
Broadcast Storm
Multiple copies of frames being forwarded back and forth which then consumes the network.
41
Root Bridge
Switch with the lowest bridge ID (BID)
42
Non-Root Bridge
All other switches in an STP toplogy
43
Root Port
Every non-root bridge has a single root port which is the closest to the root bridge in terms of cost.
44
Virtual Local Area Network (VLAN)
Allows different logical networks to share the same physical hardware and provides added security and efficiency.
45
Virtual Private Network (VPN)
Creates a secure VPN or virtual tunnel over an untrusted network like the Internet.
46
VPN Concentrator
Terminates VPN tunnels and allows for multiple VPN connections in one location.
47
VPN Headend
A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device.
48
Firewall
A network security appliance placed at the boundary of a network. Software and Hardware Stateful or stateless methods
49
Next-Generation Firewall (NGFW)
Conducts deep packet inspection at Layer 7 and can look through traffic to detect and prevent attacks.
50
Intrusion Detection/Prevention System
Recognizes and responds to attacks through signatures and anomalies.
51
Proxy Server
A specialized device that makes requests to an external network on behalf of a client.
52
Content Engine/Caching Engine
Dedicated appliance that performs the caching functions of a proxy server.
53
Content Switch/Load Balancer
Distributes incoming requests across various servers in a server farm.
54
VoIP Phone
A hardware device that connects to your IP network to make a connection to a call manager within your network.
55
Unified Communications (or Call) Manager
Used to perform the call processing for hardware and software-based IP phones.
56
Industrial Control System (ICS)
Describes the different types of control systems and associated instrumentation.
57
Supervisory Control and Data Acquisition (SCADA)
Acquires and transmits data from different systems to a central panel for monitoring and control.