terms to know 4 Flashcards

1
Q

traffic shaping (packet shaping)

A

prioritizing traffic on the network. Set priorities for different applications so some get more then others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.3af
802.3at
802.3bt

A

poe
poe+
poe++

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1d
802.1w

A

regular stp
rapid stp convergence time 6 sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port mirroring

A

copy traffic from one interface.
mirror traffic from one switch to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.3x

A

flow control known as “pause frame”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

latency

A

delay between request and response. Waiting time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jitter

A

time between frames known as “choppy” voice calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMP traps

A

remote device performs its own monitoring and when a certain value is exceeded we get an alert. udp162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

audit logs

A

what did they do and when. more specific than traffic logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encapsulation error

A

has layer 3 packet to forward but is lacking layer 2 header element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ups

A

uninterruptable power supply. short term backup power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pdu

A

power distribution units. extension cord

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mttr

A

mean time to repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mtbf

A

mean time between failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cve

A

common vulnerabilities and exposures. list of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

least privelege

A

give bare minimum access to do their job

17
Q

rbac

A

role based access control. your rights and permissions are based on your role

18
Q

separation of duties

A

no user should be given enough privileges to misuse the system on their own

19
Q

EAP

A

Extensible Authentication Protocol. a framework designed to support multiple authentication protocols

20
Q

tailgating vs piggybacking

A

tailgating the person has no permission to follow.
piggybacking the person got permission to follow.

21
Q

site to site vpn

A

corporate network and a branch office network

22
Q

client to site vpn

A

connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate

23
Q

control place policing

A

allows for QoS configurations

24
Q

VNC

A

virtual network computing allows to control computer remotely and has screen sharing option
port 5900

25
Q

access control vestibule

A

little room where one person has to go at a time also known as mantrap

26
Q

plenum vs riser rated cabling

A

plenum cable is fire resistant and is put in places you cant see, can also be used in riser rated places.

27
Q

RS232

A

signal sent throught db9 or db25 connectors.

28
Q

straight thru vs crossover cable

A

difference is crossover cable has the pins inside flipped

29
Q

EUI

A

Extended Unique Identifier (EUI-64) is a special address format that is basically MAC address but 64 bit for ipv6

30
Q

wireless client isolation

A

Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another.