N10-007.9 Flashcards
100Base-TX
Cat 5 (or higher) UTP
100Mbps
100 m
1000Base-SX
SMF
1 Gbps
5 km
LX / EW
L - Long, E - Extended : SMF
10GBase-T
Cat 6a or 7
10Gbps
100 m
SR, SW
S - Short, MMF
VTP
VLAN Trunking Protocol
Cisco Proprietary
Allows a VLAN created on one switch to be propogated to other switches in a group of switches (VTP domain). Carried over a trunk connection
IPsec
- encrypts application layer data.
- provides security for routers sending routing data across the public intern-et.
- provides authentication without encryption, like to authenticate that the data originates from a known sender.
- protects network data by setting up circuits using IPsec tunneling in which all data is being sent between the two endpoints is encrypted, as with a Virtual Private Network(VPN) connection.
SHA
The Secure Hash Algorithms are a family of cryptographic hash functions
DES
The Data Encryption Standard is a symmetric-key algorithm for the encryption of electronic data. Short key length makes it too insecure
PSTN
Public Switched Telephone Network
A network diagram is a visual representation of _____ _______.
network architecture. (Think layout of network, not necessarily where things are at in the building)
A _____ _____ is a two-dimensional elevation drawing showing the organization of specific equipment on a rack.
rack diagram
Line Interactive UPS
- detects power changes/loss
- boosts or increase utility power
- mainly used in areas where utility power is clean
- less reliable than double conversion UPS
Double conversion UPS
These UPS systems provide your facility the highest level of protection by isolating the equipment from raw utility power. The system works by converting power from AC to DC and then back to AC.