Module 3.5 Flashcards
If a MAC address cannot be found in the MAC address table, then the switch acts like a ______ and transmits the frame out of all the ports, except for the source port
hub
Preventing a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.
port security
Combining the bandwidth of two or more switch ports into a single channel link.
port aggregation
IEEE protocol governing the use of bonded Ethernet ports (NIC teaming).
Link Aggregation Control Protocol (LACP)
Port aggregation is often implemented by the ______________________
Link Aggregation Control Protocol (LACP)
Copying ingress and/or egress communications from one or more switch ports to another port. This is used to monitor communications passing over the switch.
port mirroring
Unlike a hub, a __________ forwards unicast traffic only to the specific port connected to the intended destination interface
switch
Port mirroring copies all _____________ sent to one or more source ports to a mirror (or destination) port.
packets
The _____________________ would be used by management or monitoring software, such as a packet sniffer, network analyzer, or intrusion detection system (IDS) sensor
mirror port
Ethernet frame with a payload larger than 1500 bytes (up to about 9000 bytes).
Jumbo Frames
When implementing jumbo frames, it is critical that all hosts and appliances (switches and routers) along the communications path be able and configured to _______________
support them
Mechanism defined in IEEE 802.3a that allows a server to instruct a switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.
Flow Control
Specification allowing power to be supplied via switch ports and ordinary data cabling to devices such as VoIP handsets and wireless access points. Devices can draw up to about 13W (or 25W for PoE+).
POE