Network Implementation Flashcards

Net+ N10-009

1
Q

Subnetting

A

Dividing a network into smaller subnetworks to improve management and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crosstalk

A

Effect caused by the unintentional and undesired transmission of a signal from one cable to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is VLSM (Variable Length Subnet Masking)?

A

Allows subnets of varying sizes within the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jitter

A

Time delay between when a signal is transmitted and when it’s received over a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NetFlow

A

Collects IP traffic information and monitoring network flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is trunking?

A

Technique used to carry multiple VLANs over a single network link using VLAN tagging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does STP (Spanning Tree Protocol) do?

A

Prevents network loops by creating a loop-free logical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is link aggregation?

A

Combines multiple physical network connections into one logical connection to increase bandwidth and provide redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is port forwarding?

A

Directs external network traffic to a specific internal IP address and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IPSec (Internet Protocol Security) used for?

A

Secures IP communications through encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do WPA (Wi-Fi Protected Access) and WPA2 provide?

A

Provide security protocols to protect wireless networks from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is 802.1X used for?

A

Provides port-based network access control for securing network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does ARP stand for and what does it do?

A

Address Resolution Protocol maps an IP address to a MAC address on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DHCP lease?

A

Is the duration for which an IP address is assigned to a device before it must be renewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DHCP scope?

A

Range of IP addresses that a DHCP server can assign to clients on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is VLAN tagging?

A

Adds a tag to Ethernet frames to identify which VLAN the frame belongs to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a VPN tunnel?

A

A secure, encrypted connection established between a client and a VPN server over a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is PAT in networking?

A

Maps multiple private IP addresses to a single public IP address with different port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does MPLS stand for and what is its use?

A

Multiprotocol Label Switching is used to efficiently route data through a network based on labels rather than IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does RADIUS stand for and what is its function?

A

Remote Authentication Dial-In User Service is used for centralized authentication, authorization, and accounting for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is throughput?

A

Rate at which data is successfully transmitted over a network, measured in bits per second.

22
Q

What does MTU stand for and what does it specify?

A

Maximum Transmission Unit specifies the largest size of a packet that can be transmitted over a network.

23
Q

What does BGP stand for and what is its role?

A

Border Gateway Protocol is used to exchange routing information between different autonomous systems on the internet.

24
Q

What is network latency?

A

Latency is the delay before a transfer of data begins following an instruction for its transfer.

25
What is WEP (Wired Equivalent Privacy)?
Provides basic encryption for Wi-Fi networks but is considered insecure due to its vulnerabilities.
26
Autonomous system number
Globally unique 16 digit identification number
27
WPA2 Enterprise
Wi-Fi security protocol that uses 802.1X authentication and encryption to provide secure wireless network access for businesses.
28
WPA Personal
Wi-Fi security protocol that uses a pre-shared key for encryption and authentication on home networks.
29
MDF (Main Distribution Frame):
Is the central point in a building’s network infrastructure where incoming and outgoing network connections are managed and distributed.
30
IDF (Intermediate Distribution Frame)
Network distribution point used to connect network cables between the MDF and end-user devices or areas.
31
Patch Panel
Network hardware device that provides a centralized point to connect and manage network cables and connections.
32
LACP (Link Aggregation Control Protocol)
Protocol is used to group numerous physical ports to make one high bandwidth path.
33
NFC (Near Field Communication)
Communication between two electronic devices over a distance of 4 cm or less.
34
What is the primary purpose of implementing link aggregation on a network switch?
Create a single logical link with more bandwidth by combining multiple physical links.
35
What are Jumbo frames and why are they concerning?
Ethernet frames whose MTU is greater than 1500 and are commonly used on a SAN
36
Transmit Power Control (TPC)
Allows devices to adjust their transmitting power levels
37
Frequency bands used by 802.11 networks include
2.4 and 5.0 Ghz
38
802.11a frequency
5.0 GHz
39
802.11b frequency
2.4 Ghz
40
802.11g frequency
2.4 Ghz
41
802.11n frequency
2.4 and 5.0 Ghz
42
802.11ac (wi-fi 5) frequency
5.0 Ghz
43
802.11ax (wi-fi 6) frequency
2.4 and 5.0 Ghz
44
In data center fire safety, what system is designed to minimize damage to networking infrastructure with the least environmental concerns during a fire emergency?
Clean Agent Fire Suppression
45
North-south traffic flow
Data transmission pattern that describes data flow between local network endpoints and external networks and services
46
Class A IPv4
1.x.x.x to 126.x.x.x
47
Class B IPv4
128.x.x.x - 191.x.x.x
48
Class C IPv4
192.x.x.x - 223.x.x.x
49
Class D IPv4
224.x.x.x - 239.x.x.x
50
Class E IPv4
240.x.x.x - 255.x.x.x
51
T568B
1) Orange/White 2) Orange 3) Green/White 4) Blue 5) Blue/White 6) Green 7) Brown/White 8) Brown
52
T568A
1) Green/White 2) Green 3) Orange/White 4) Blue 5) Blue/White 6) Orange 7) Brown/White 8) Brown