Ethernet Fundamentals Flashcards

1
Q

Deterministic Network

A

Medium that is very organized, orderly and requires an electronic token to transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Contention-based Network

A

Medium that is very chaotic and can transmit whenever possible. Can cause collisions. Used by Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

Prevents collisions by using carrier-sensing to defer transmissions until no other stations are transmitting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Collision Domain

A

Each are of the network that shares a single segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet Switch

A

Increases scalability of a network by creating multiple collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAT 3

A

10BASE-T
10 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CAT 5e

A

1000BASE-T
1000 Mbps
100meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CAT 5

A

100BASE-TX
100 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAT 6

A

1000BASE-T / 10GBASE-T
1000 Mbps / 10 Gbps
100 meters / 55 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAT 6a

A

10GBASE-T
10 Gbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAT 7

A

10GBASE-T
10 Gbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAT 8

A

40GBASE-T
40 Gbps
30 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bandwidth

A

Measures how many bits the network can transmit per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

100BASE-FX

A

MMF
100 Mbps
2 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

100BASE-SX

A

MMF
100 Mbps
300 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1000BASE-SX

A

MMF
1000 Mbps
220-550 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1000BASE-LX

A

SMF / MMF
1000 Mbps
5 kilometers / 550 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

10GBASE-SR

A

MMF
10 Gbps
400 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

10GBASE-LR

A

SMF
10 Gbps
10 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

10BASE-T

A

10 Mbps
100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bandwidth

A

Measures how many bits the network can transmit per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hub

A

Also known as a multiport repeater, it is a Layer 1 device that connects multiple network devices and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bridge

A

Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC in the frames.

24
Q

Switch

A

Also known as a multiport bridge, it is a Layer 2 device that connects multiple network segments together. Focused on MAC addresses.

25
Q

Router

A

Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information. Focused on IP addresses.

26
Q

Layer 3 Switch

A

Makes Layer 3 routing decisions and then interconnects entire networks, not just network segments.

27
Q

Link Aggregation (IEEE 802.3ad)

A

Combines multiple physical connections into a single logical connection to minimize or prevent congestion.

28
Q

Power Over Ethernet
PoE 802.3af
PoE+ 802.3at

A

Supplies electrical power over ethernet and requires CAT 5 or higher copper cable.
PoE 802.3af - Up to 15.4 watts
PoE+ 802.3at - Up to 25.5 watts

29
Q

Port Monitoring or Mirroring

A

Makes a copy of all traffic destined for a port and sends it to another port.

30
Q

User Authentication (802.1x)

A

Requires users to authenticate themselves before gaining access to the network.

31
Q

Secure Shell (SSH)

A

Remote administration program that allows connection to the switch over a network.

32
Q

Console Port

A

Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45).

33
Q

Out-of-band (OOB) Management

A

Keeps all network configuration devices on a separate network.

34
Q

First-Hop Redundancy

A

Uses Hot Standby Router Protocol (HSRP) to create virtual IP and MAC addresses to provide active and standby routers.

35
Q

MAC Filtering

A

Permits or denies traffic based on a device’s MAC address.

36
Q

Traffic Filtering

A

Permits or denies traffic based on IP addresses or application ports.

37
Q

Quality of Services (QoS)

A

Forwards traffic based on priority markings.

38
Q

Spanning Tree Protocol (802.1d)

A

Permits redundant links between switches and prevents looping of network traffic.

39
Q

Shortest Path Bridging (SPB)

A

Used instead of STP for larger network environments.

40
Q

Broadcast Storm

A

Multiple copies of frames being forwarded back and forth which then consumes the network.

41
Q

Root Bridge

A

Switch with the lowest bridge ID (BID)

42
Q

Non-Root Bridge

A

All other switches in an STP toplogy

43
Q

Root Port

A

Every non-root bridge has a single root port which is the closest to the root bridge in terms of cost.

44
Q

Virtual Local Area Network (VLAN)

A

Allows different logical networks to share the same physical hardware and provides added security and efficiency.

45
Q

Virtual Private Network (VPN)

A

Creates a secure VPN or virtual tunnel over an untrusted network like the Internet.

46
Q

VPN Concentrator

A

Terminates VPN tunnels and allows for multiple VPN connections in one location.

47
Q

VPN Headend

A

A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device.

48
Q

Firewall

A

A network security appliance placed at the boundary of a network.
Software and Hardware
Stateful or stateless methods

49
Q

Next-Generation Firewall (NGFW)

A

Conducts deep packet inspection at Layer 7 and can look through traffic to detect and prevent attacks.

50
Q

Intrusion Detection/Prevention System

A

Recognizes and responds to attacks through signatures and anomalies.

51
Q

Proxy Server

A

A specialized device that makes requests to an external network on behalf of a client.

52
Q

Content Engine/Caching Engine

A

Dedicated appliance that performs the caching functions of a proxy server.

53
Q

Content Switch/Load Balancer

A

Distributes incoming requests across various servers in a server farm.

54
Q

VoIP Phone

A

A hardware device that connects to your IP network to make a connection to a call manager within your network.

55
Q

Unified Communications (or Call) Manager

A

Used to perform the call processing for hardware and software-based IP phones.

56
Q

Industrial Control System (ICS)

A

Describes the different types of control systems and associated instrumentation.

57
Q

Supervisory Control and Data Acquisition (SCADA)

A

Acquires and transmits data from different systems to a central panel for monitoring and control.