Networking Flashcards

1
Q

Patch panel

A

What to look out for
- Device that allows cable network jacks from a wall into a central area
- Computers are connected to wall jacks in this system, and connected to patch panel by cables, running in the walls
- Pre-wired, RJ 45 port on the switch using a switch through or patch cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAP

A

Wireless access point

What to look out for
- Device that allows wireless devices to connect to a wired network
- Connect directly to a wired LAN or local area network then the WAP provides wireless connections using Wi-Fi for other devices to use that wired connection
- supports multiple wireless devices through their wired connection
- should always be configured with channels 1, 6, and 11 to maximize distance between channels and prevent overlaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hub

A

Would you look out for?
- Whatever is received on one port is repeated out every other port
- Has several different ports between 4 and 48 po

Benefits

Cons
- Leads to collisions
- increases in the number of re-broadcasts which slows down the entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static IP

A

What to look out for
- Manually input, IP address, subnet Mask, gateway, and DNS( domain name server or domain names system)
- used to ensure servers are easy to find
- used when DHCP is disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic IP

A

Would you look out for?
- Automatically assigned using DHCP

Benefits

Cons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APIPA address

Windows-based

Autom…

A

Automatic, private, IP, addressing (also called Link local address)

What to look out for
- windows-based operating systems feature
- 169.254.0.0 to 169.254.255.255
D iscover
O ffer
R equest
A cknowledge
- Enables computer to automatically assign itself an IP address when DHCP is not available to perform the function
- it can communicate with other hosts on the same network using APIPA
- APIPA to APIPA only
- can’t reach host that have valid IP obtained by DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VLAN

A

Virtual local area network

What to look out for
- can divide single switch into multiple networks
- only supported on managed switches
- Can communicate between different VLAN
- allows sub networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN

A

Virtual private network

What to look out for
- Extends private network across public network
Enables users to send/receive data share or public networks as if connected to private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSL modem

A

Digital subscriber line

What to look out for
- used to connect computer or router to phone line which supplies Internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamic NAT

A

What to look out for
- Many-to-one mapping of private IP addresses or subnet masks inside a LAN or local area network inside to a public IP or subnet the local area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11AC ( Wi-Fi 5)

A

What to look out for
- 5 GHz frequency
- 6.9 Gbps
- Multiple user multiple input multiple output (MUMIMO
- channel bonding? (160MHZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11AX (Wi-Fi 6)

A

What to look out for
- 2.4 GHz and 5 GHz frequency
- 9.6 Gbps
- orthogonal frequency division multiple access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11a

A

What to look out for
- 5 GHz frequency
- 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11b

A

What to look out for
- 2.4 GHz frequency
- 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11g

A

What to look out for
- 2.4 GHz frequency
- 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11n

A

What to look out for
- 2.4 GHz and 5 GHz frequency
- 150 Mbps (2.4GHz)
- 600 Mbps (5GHz)
- multiple input multiple output (MIMO)
- channel bonding? (Combining 220 MHz channels to a single 40 MHz channel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MX record

A

What to look out for
- Used for outgoing SMTP and incoming POP 3/IMAP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Canonical name (or alias name)

What to look out for
- associates, one domain name as an alias of another (EX: beta.diontraining.com -> www.diontraining.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A record

A

What to look out for?
- associates domain name with IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AAAA Record

A

What to look out for
- Associates domain name with IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Files sharing server

A

What to look out for
- A server that is used to host and control access to shared files/folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What channels prevent interference and ensure non-overlapping of channels

Big Grapes Need Axes

A
  • Channel 1, 6, and 11
  • this includes 802.11B, 802.11G, 802.11N, 802.11AX
  • utilizes 2.4 GHz (can only select 1 and 11 in the US)
  • increases reliability and throughput
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network tap

A

What to look out for
- create a physical connection to network
- send copy of every packet received to a monitoring device for capture and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Wi-Fi analyzer

A

What to look out for
- determines signal strength, frequency, radio, frequency interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Tone generator

A

What to look out for
- Connected to a wall jack
- send repeating signal over cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Toner probe

A

What to look out for
- detects cables connected to wall jack by detecting signal sent by tone generators
- Must be near or touching cable to identify positively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cable tester

A

What to look out for
- Provide detailed info on physical/electrical properties of
- Test, test and report cable
- cross talk, attenuation, noise, resistance, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

5 GHz wireless frequency

A

what to look out for
- 5 GHz has more channels
- Supports higher data rates than 2.4 GHz
- Less congestion and interference than 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

2.4 GHz frequency

A

What to look out for
- Longer wavelength than. 5 GHz
- Better at penetrating services than 5 GHz
- longer range with same output levels
- each channel on the 2.4 GHz spectrum is 20 MHz wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Intrusion prevention system

A

Intrusion prevention system (IPS)

What to look out
- network security that detects and prevents identified threats
- Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them
- IPS can block malicious network traffic, unlike an IDS, which can only log them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Proxy server

A

What to look out for
- a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Syslog

A

System logging protocol

What to look
- port 514
- a way network devices can use a standard message format to communicate with a logging server.
- It was designed specifically to make it easy to monitor network devices.
- Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SSH

A

Secure shell

What to look out for
- is the protocol used for remote administration and file copying
- TCP port 22
- SSH is considered secure since it uses authenticated and encrypted sessions for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

FTP

A

File transfer protocol

What to look out for
- used to transfer files across the internet
- ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HTTP

A

Hypertext transfer protocol

What to look out for
- used to provide web content to browsers
- port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Network Basic Input/Output System (NetBIOS) Ports

A

Ports 137, 139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Simple Network Management Protocol (SNMP) ports

A
  • TCP/IP
  • Ports 161, 162
  • Used to collect data about network devices and monitor
    their status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Lightweight Directory Access Protocol (LDAP)

A

Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Server Message Block (SMB)

A

o Port 445
o Used for Windows file and printer sharing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Remote Desktop Protocol (RDP)

A

o Port 3389
o Provides graphical remote control of another client or
server
o RDP provides a full graphical user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Virtual Network Computing (VNC)

A

Port 5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

PAN

A

Personal area network

What to look out for
- Close range network
- based on Bluetooth or near field communication (NFC) for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CAN

A

Campus Area Network (CAN)
▪ Connects LANs that are building-centric across a university, industrial
park, or business park
● Up to a few miles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

LAN

A

Local area network

What to look out for
- is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media.
- Connects components within a limited distance
● Up to a few hundred feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

WAN

A

Wide area network

What to look out for
- Spans multiple geographic locations
- Often established with leased telecommunications (Telecom) circuits
- Worldwide coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SAN

A

Storage area network

What to look out for
- Dedicated independent high-speed network
- Interconnect and delivers shared pools of storage devices to multiple servers
- Often uses fiber channel over ethernet (FCOE), fiber, channel, or Internet small computer systems interface (ISCSI) to achieve the speeds necessary to support SAN operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

WLAN

A

Wireless local area network

What to look out for
- Connect computers within a small and specific geographical area using 802.11 protocols for their wireless connecting
- A wireless distribution method for two or more devices that creates a
local area network using wireless frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

MAN

A

Metropolitan area network

What to look out for
- Computer network that interconnects users within computer resources in a region, the size of a metropolitan area or city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Legacy system

A

What to look out for
- A legacy system is no longer directly supported by its vendor
- Legacy systems usually work well for what they do (which is why they don’t get prioritized for replacement), but they represent very severe risks in terms of security vulnerabilities.
- Networks often need to retain hosts running DOS or legacy versions of Windows (8.1 and earlier) or old-style mainframe computers to run services that are too complex or expensive to migrate to a more modern platform.
- The most convenient and least expensive way to connect older devices would be to buy an adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

UTM

A

Unified threat management

What to look out for
- are network appliances that provide all the security functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and other security devices into a single device or appliance.
Advantages
- Reduced # of devices
- Lower costs
- Easier to install
Disadvantages
- Single point of failure
- Lacks detail provided by a
specialized tool
- Performance is not as effieient as single function devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Patch systems

A

What to look out for
- used to conduct patch management across your organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Embedded system

A

What to look out for

  • is a computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

POE

A

Power over ethernet

What to look out for
- Power over Ethernet (POE) provide power over ordinary data cabling to devices such as VoIP handsets and wireless access points
- PoE can support up to 15.4W
- 802.3af (PoE)
- 15.4W of power at distance of up to 100m.
- PoE can support low-powered devices such as VoIP handsets.

54
Q

PoE+

A

Power over ethernet +

What’s to look out for?
- Can support up to 25W
- 802.3at (PoE+) standard can support up to 25W of power at a distance of up to 100 meters
- PoE+ can support higher-powered devices such as PTZ cameras, door controllers, and thin client computers

55
Q

Switches

A

▪ Smart hubs that remember the ports that are connected to them
● Switches can have multiple people talking at one time
o Unmanaged Switch
▪ Performs its functions without requiring a configuration
o Managed Switch
▪ Performs its functions with configuration

56
Q

Firewall

A

Scans and blocks traffic that enters or leaves a network
● Unified threat management (UTM) contains firewall features
- Packet-filtering
● Stateful
● Proxy
● Dynamic packet-filtering
● Kernel proxy

57
Q

Optical Network Terminal (ONT)

A

Terminates fiber connection

58
Q

Small Office, Home Office (SoHo) LAN

A

Uses a centralized server or simply provides clients access to local
devices like printers, file storage, or the Internet

59
Q

Twisted Pair Cables

A

o STP (Shielded) and UTP (Unshielded) operate about the same
o Keep cable runs under 70 meters from the IDF to the office

60
Q

Single Mode Fiber (SMF)

A

▪ Used for longer distances and has smaller core size which allows for only
a single mode of travel for the light signal
- More expensive
● SMF’s core size is 8.3-10µ in diameter

61
Q

Multimode Fiber (MMF)

A

Used for shorter distances and has larger core size which allows for
multiple modes of travel for the light signal
- Lager core size
- Covers shorter distances
- less expensive
● MMF’s core size is 50-100µ in diameter
● Up to 2 kilometers or less

62
Q

Fiber Optic Cable

A

Uses light from an LED or laser to transmit information through a thin
glass fiber
● Greater usable range
● Greater data capacity
- Switches, routers, and end-user devices can become a limitation

63
Q

Coaxial Cabling

A

Coaxial Cable (Coax)
▪ One of the oldest categories of copper media that is still used in
networking today

64
Q

Cable Stripper

A

Used to strip off the end of the cable and prepare it for attachment to a
connector

65
Q

Cable Crimper

A

Used to attach the connector to the end of the cable

66
Q

Punch-Down Block

A

Terminates the wires and strips off excess installation and extra wires
that are no longer needed

67
Q

Wi-Fi (802.11)

A

Creates point to point connections from one building to another over a
relatively short distance

68
Q

Cellular

A

Uses a larger antenna and a larger hotspot powered by a power outlet
within an office or home

69
Q

Microwave

A

▪ Creates point to point connection between two or more buildings that
have longer distances
▪ A traditional microwave link can cover about 40 miles of distance
- UHF, SHF, and EHF

70
Q

Satellite

A

A long range and fixed wireless solution that can go for miles
● Slow
● Expensive
● High latency

71
Q

Radio Frequency dentification (RFID)

A

A form of radio frequency transmission modified for use in authentication
systems

72
Q

Cellular Connections

A

1G: 30 KHz - 2 Kbps
2G: 1800 MHz - 14.4 Kbps to 2 Mbps
3G: 1.6 to 2 GHz - 144Kbps to 2 Mbps
4G: 2 to 8 GHz - 100 Mbps o 1 Gbps
5G
- Low band: 600-850 MHZ (30-250 Mbps)
- Mid band: 2.5-3.7 GHz (100-900 Mbps)
- High band: 25-39 GHz (Extremely high speed (In Gbps)

73
Q

TCP

A
  • Transmission Control Protocol
  • Reliable (Threeway handshake)
  • Connection oriented
  • Segment retransmission and flow control (Windowing)
  • With segmentation of sequencing
  • Acknowledgement
74
Q

Network Interface Card (NIC)

A

Provides an ethernet connection to the network

75
Q

Internet of Things

A

▪ A global network of appliances and personal devices that have been
equipped with sensors, software, and network connectivity to report
state and configuration
● Segregation of IoT devices is critically important for the business
network’s securit

76
Q

Bandwidth

A

The theoretical measure of how much data could be transferred from a
source to its destination

77
Q

Throughput

A

The actual measure of how much data is successfully transferred from a
source to its destination

78
Q

568b

A

The standard that’s preferred when wiring jacks inside of buildings

79
Q

MDIX

A

A medium dependent interface crossover (MDIX) is an automated way to
electronically simulate using a crossover cable

80
Q

Wire Mapping Tool

A

Works like a cable tester, but specifically for twisted pair ethernet cables

81
Q

Pre-Shared Key

A

▪ Both the access point and the client use the same encryption key
▪ It’s not a good idea to use pre-shared keys in large environments

82
Q

Wired Equivalent Privacy (WEP)

A

Original 802.11 wireless security standard which is an insecure security
protocol
▪ WEP uses 24-bit Initialization Vector (IV) sent in clear text

83
Q

Wi-Fi Protected Access (WPA)

A

▪ Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)
▪ WPA uses 48-bit Initialization Vector (IV) instead of 24-bit
Rivest Cipher 4 (RC4)
● Message Integrity Check (MIC)
● Enterprise Mode

84
Q

Wi-Fi Protected Access 2 (WPA2)

A
  • requires stronger encryption
    and integrity checking through CCMP
    Advanced Encryption Standard (AES)
    ● Personal Mode
    ● Enterprise Mode
85
Q

Cable Modems

A

Uses a cable TV network that is made up of a hybrid fiber-coaxial (HFC) distribution network

86
Q

Data-Over-Cable Service Interface Specifications (DOCSIS)

A

▪ Specific frequency ranges used for upstream and downstream
transmissions
● Upstream
o 5 MHz to 42 MHz
● Downstream
o 50 MHz to 860 MHz

87
Q

Fiber To The Curb (FTTC)

A

Runs a fiber optic cable from an internet provider access point to a curb

88
Q

Fiber To The Premises (FTTP)

A

Fiber optic that connects directly to a building and connects to an optical
network terminal (ONT)

89
Q

Optical Network Terminal (ONT)

A

Physical devices that convert optical signals to electrical signals

90
Q

Link/Network Interface Layer

A

In the link/network interface layer, the data can only travel through the
local area network

91
Q

Internet Layer

A

Used to address packets and route them across the network

92
Q

Transport Layer

A

Shows how to send the packets
● TCP
o Transmission Control Protocol
● UDP
o User Datagram Protocol

93
Q

Application Layer

A

Contains all the protocols that perform higher-level functions

94
Q

7 layers of the OSI Model

A

All: Application (Layer 7)
People: Presentation (Layer 6)
Seem: Session (Layer 5)
To: Transport (Layer 4)
Need: Network (Layer 3)
Data: Data Link (Layer 2)
Processing: Physical (Layer 1)

95
Q

Loopback Address (127.0.0.1)

A

Creates a loopback to the host and is often used in troubleshooting and
testing network protocols on a system

96
Q

Domain Name System (DNS)

A

▪ Converts the domain names used by a website to the IP address of its
server
▪ DNS is the internet version of a phone book

97
Q

Bootstrap Protocol (BOOTP)

A

Dynamically assigns IP addresses and allows a workstation to load a copy
of boot image to the network

98
Q

Dynamic Host Control Protocol (DHCP)

A
  • Provides an IP address to every machine on the network and eliminates
    configuration errors
    192.168.1.100 through 192.168.1.200
  • Ports 67, 68
  • Each IP is leased for a period of time and returns to the pool when
    the lease expires
99
Q

MX (Mail Exchange)

A

Directs emails to a mail server

100
Q

TXT

A

Adds texts into th DNS

101
Q

NS (Name Server)

A

Indicates which DNS nameserver has the authority

102
Q

Full Tunnel VPN

A

Routes and encrypts all network requests through the VPN connection
back to the headquarters

103
Q

Split Tunnel VPN

A

Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet

104
Q

Secure Socket Layer (SSL)

A

Provides cryptography and reliability using the upper layers of the OSI model (Layers 5, 6, and 7)

105
Q

Transport Layer Security (TLS)

A

▪ Provides secure web browsing over HTTPS

106
Q

Globally Routed

A

Like IPv4’s unicast class A, B, and C addresses
and begins with 2000-3999

107
Q

Link-Local/Local Use

A

Used like a private IP in IPv4 that can only be used on the
local area network and begins with FE80

108
Q

Stateless Address Autoconfiguration (SLAAC)

A

Eliminates the need to obtain addresses or other configuration
information from a central server

109
Q

Multicast Address

A

Used to identify a set of interfaces and begins with FF

110
Q

Anycast Address

A

Used to identify a set of interfaces so that a packet can be sent to any member of a set

111
Q

Extended Unique Identifier (EUI)

A

Allows a host to assign itself a unique 64-bit IPv6 interface identifier
called EUI-64

112
Q

Port

A

▪ Logical communication endpoint that exists on a computer or server
- Ports can be any number between 0 and 65,535

113
Q

Well-Known Ports

A

Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)

114
Q

Registered Ports

A

Ports 1024 to 49151

115
Q

Trivial File Transfer Protocol (TFTP)

A

● Ports 69
● a connectionless protocol that uses UDP as its transport

116
Q

Remote Authentication Dial-In User Service (RADIUS)

A

Provides centralized administration of dial-up, VPN, and wireless
authentication services for 802.1x and the EAP
- Relies on UDP
- Combines authentication and authorization
- Does not support all network protocols
- has cross-platform capability
RADIUS operates at the application layer

117
Q

Terminal Access Controller Access-Control System Plus (TACACS+)

A

Proprietary version of RADIUS that can perform the role of an
authenticator in 802.1x networks
- Relies on TCP
- Separates authentication, authorization, and accountinh processes
- Supports all network protocols
- Exclusive to Cisco devices

118
Q

Authorization

A

▪ Occurs when a user is given access to a certain piece of data or certain
areas of a building

119
Q

Kerberos

A

Authentication protocol used by Windows to provide for two-way
(mutual) authentication using a system of tickets

120
Q

Accounting

A

Ensures the tracking of data, computer usage, and network resources is
maintained

121
Q

Telnet

A

Port 23

122
Q

Terminal Emulator (TTY)

A

▪ Any kind of software that replicates the TTY I/O functionality to remotely
connect to a device
▪ TTY is the terminal or end point of the communication between the
computer and the end-user

123
Q

Managed Devices

A

Computers and other network-attached devices monitored using agents
by a network management system

124
Q

Load Balancer/ Content Switch

A

▪ Distributes incoming requests across several servers inside a server farm
or a cloud infrastructure
▪ A load balancer is one of the key things to help defend against a DoS
attack or a DDoS attack

125
Q

Industrial Control System (ICS)

A

▪ Provides the mechanisms for workflow and process automation by
controlling machinery using embedded devices
▪ Multiple ICSs can create a distributed control system (DCS)

126
Q

Supervisory Control and Data Acquisition (SCADA)

A

▪ Type of ICS used to manage large scale multi-site devices and equipment
in a geographic region from a host computer

127
Q

CAT5

A
  • 100 Mbps
    • 100Base-TX(Twisted pair)
  • 100m
128
Q

CAT5e (Gigabit Ethernet)

A
  • 1000base-T
  • 1000 Mbps (1Gb)
  • 100m
129
Q

CAT6

A
  • 1000 Base-T
  • 1000 Mbps
  • 100m
    or
  • 10G Base-T
  • 10 Gbps
  • 55m
130
Q

CAT6a

A
  • 10G Base-T
  • 10 Gbps
  • 100m
131
Q

CAT7

A
  • 10G Base-T
  • 10 Gbps
  • 100m
132
Q

CAT8

A
  • 40G Base-T
  • 40 Gbps
  • 30m