Network Implementations Flashcards

1
Q

what type of switch can do routing

A

layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

most common type of device

A

access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

control multiple access points and control them

A

wireless lan controller(WLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

extend the range of the cables and wifi

A

repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

common device

A

network printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network devices perimeter

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the course for the router has been set manually

A

static routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how long the router tries that path

A

time to live(ttl)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

shortest number of hops or routers between me and the destination.

A

distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

everything thats under your administrative control. Its also used to decide the shortest path for data to travel

A

interior gateway protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

one of the Interior Gateway Protocols (IGPs) used to manage routing within an autonomous system (AS), which is a collection of networks under a single administrative control

A

RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hybrid between distance vector and link state protocol.

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a widely used interior gateway protocol (IGP) that is designed to efficiently route data traffic within a single autonomous system (AS), which is typically a single organization’s network. It falls under the link-state routing protocol category, which means that routers exchange information about their directly connected links and then use that information to build a detailed map of the network topology. This allows routers to calculate the shortest paths to different destinations within the network.

A

open shortest path first(OSPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in networking refers to the process by which routers in a network reach a consistent and up-to-date understanding of the network’s topology and routing information

A

convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

standardized exterior gateway protocol that is primarily used to exchange routing and reachability information between different autonomous systems (ASes) on the internet. It is classified as a path vector protocol and is responsible for determining the best path for data to traverse from one AS to another.

A

Border Gateway protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

best routes from source to destination

A

routing

17
Q

combine bandwidths

A

lacp(link aggregation control protocol)

18
Q

detects and adjusts ethernet cables so they work properly

A

mdix(medium dependent interface crossover)

19
Q

voice vlans are specific to what company

A

cisco

20
Q

tagging

A

802.1q

21
Q

copy from one port and send to another

A

Port Mirroring

22
Q

only computers with certain macs can plug in here

A

port security

23
Q

creates a topology that helps prevent network loops

A

Spanning tree protocol

24
Q

radiates energy more effectively in a single direction

A

Directional
-directional
-dish
-yagi

25
Q

non directional circular pattern/Radiated pattern

A

omnidirectional
-dipole
-collinear

26
Q

one access point for multiple devices

A

Basic service set

27
Q

multiple access points handling and controlling a single WAN/LAN

A

extended service set

28
Q

when you get far from one access point and connect to another on a single network

A

roaming

29
Q

weak, every frame has a static key, 64 - 128 bit key

A

WEP wired equivelant privacy

30
Q

weak but has a new key generated across every frame also known as temporal key integrity

A

WPA wifi protected access

31
Q

stronger encryption , uses ccmp, AES with a 128 bit encryption key

A

wpa 2 802.11i

32
Q

strongest, uses SAE simultaneous authentication of equals, uses a 128 or 192 bit encryption 3

A

wpa3

33
Q

psk or password

A

pre shared key

34
Q

14 channels, 22 mhz wide, 1 6 11 are the ones that are in use, bluetooth operates in this frequency spectrum

A

2.4ghz spectrum

35
Q

802.11 standards

A