NETWORK+ Flashcards

network+

1
Q

RTO

A

The recovery time objective, (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MTTR

A

The mean time to repair, (MTTR) measures the average time it takes to repair a network device when it breaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTBF

A

The mean time between failures, (MTBF) measures the average time between when failures occur on a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPO

A

The recovery point objective (RPO)is is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LACP

A

The Link Aggregation Control Protocol (LACP) provides a method to control the bonding of several physical ports to form a single logical channel. The LACP is defined in the 802.3ad standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

L2TP

A

The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LLDP

A

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP

A

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMP Walk

A

SNMP Walk can be used to determine if the counter is using 32 bits or 64 bits by querying the OID of the endpoint (router interface).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PTP

A

PTP (Precision Time Protocol) is designed to provide highly accurate time synchronization for distributed systems, offering synchronization accuracy at the microsecond level. It is commonly used in applications such as industrial automation, telecommunications, and financial trading, where precise timing is critical for maintaining system integrity and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTS

A

NTS (Network Time Security) focuses on securing time synchronization communications but does not address latency and jitter concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NTP

A

NTP (Network Time Protocol) is a widely used protocol for time synchronization but may not offer the same level of precision and low-latency synchronization as PTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNTP

A

SNTP (Simple Network Time Protocol) is a simplified version of NTP that lacks some of the features for precise time synchronization found in PTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoH

A

DNS over HTTPS (DoH) is designed to enhance privacy and security by encrypting DNS queries and responses, thus preventing external monitoring and potential interception by intermediaries. By using HTTPS, DoH ensures that DNS traffic is indistinguishable from regular HTTPS traffic, offering protection against eavesdropping and tampering. While DNS over TLS (DoT) also encrypts DNS queries and responses, DoH specifically leverages the HTTPS protocol, making it more adaptable for web browsing privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNSSEC

A

DNSSEC enhances the integrity and authenticity of DNS data but does not encrypt queries and responses, focusing instead on protecting against DNS spoofing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VTP

A

VLAN Trunking Protocol (VTP) shares VLAN information to all switches in a network. VTP enables you to configure the VLAN on a VTP server for centralized configuration and management. When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain.

17
Q

STP

A

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that result from them. STP is defined in the IEEE 802.1d standard.

18
Q

IGRP

A

Interior Gateway Routing Protocol (IGRP) is a distance vector interior gateway protocol (IGP) is used by routers to exchange routing data within an autonomous system.

19
Q

Port bonding

A

Port bonding, or link aggregation, is used to combine multiple physical interfaces into a single logical bonded interface for additional bandwidth or redundancy.

20
Q

The Native VLAN

A

The Native VLAN serves as the default VLAN for any untagged traffic that comes across a trunk port. This ensures that untagged traffic can be directed to a specific VLAN, maintaining network organization and security.

21
Q

802.1Q

A

802.1Q tagging is used for identifying VLAN traffic, the Native VLAN itself is for untagged traffic.

22
Q

ESSID

A

ESSID (Extended Service Set Identifier) is the unique name that identifies a wireless network. It ensures devices connect to the correct network within a specific area.

23
Q

LAN

A

LAN (Local Area Network) refers to a network that connects computers and devices in a limited geographical area. It doesn’t address the unique name of a wireless network.

24
Q

SSID

A

SSID (Service Set Identifier), while similar to ESSID, refers to the name that identifies a wireless network.

25
Q

WAN

A

WAN (Wide Area Network) refers to a network that covers a broad area, often connecting multiple LANs. It doesn’t address the unique name of a wireless network.

26
Q

FHRP

A

First Hop Redundancy Protocol (FHRP) achieves this by allowing multiple routers to work together as a single virtual router, ensuring seamless failover in case of an active router failure.

27
Q

EIGRP

A

EIGRP is an interior gateway protocol used for routing within a single autonomous system and does not provide gateway redundancy.

28
Q

Network Metrics

A

Network Metrics represent a quantitative value used to determine the best route in routing protocols.

29
Q

TTL

A

TTL (Time to Live) represents the maximum lifespan of data packets

30
Q

QoS

A

QoS (Quality of Service) determines the level of service quality provided in a network.

31
Q

MTU

A

MTU (Maximum Transmission Unit) denotes the maximum size of a data unit that can be transmitted over a network.

32
Q

OSPF

A

Open Shortest Path First (OSPF) is a layer 3 link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm.

33
Q

VIP

A

Within a high-availability network infrastructure, a Virtual IP (VIP) provides a single point of access for clients to a service, regardless of which server in the server pool is actually providing the service. This facilitates both load balancing and failover capabilities, ensuring that the service remains available even if individual servers fail. A VIP is not merely a backup IP address but a shared address for accessing services provided by multiple servers.

34
Q

PDU

A

Power Distribution Units (PDUs) distribute power from a main source to multiple devices efficiently.

35
Q

IDF

A

Intermediate Distribution Frame