terms to know 4 Flashcards

1
Q

traffic shaping (packet shaping)

A

prioritizing traffic on the network. Set priorities for different applications so some get more then others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.3af
802.3at
802.3bt

A

poe
poe+
poe++

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1d
802.1w

A

regular stp
rapid stp convergence time 6 sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port mirroring

A

copy traffic from one interface.
mirror traffic from one switch to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.3x

A

flow control known as “pause frame”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

latency

A

delay between request and response. Waiting time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jitter

A

time between frames known as “choppy” voice calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMP traps

A

remote device performs its own monitoring and when a certain value is exceeded we get an alert. udp162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

audit logs

A

what did they do and when. more specific than traffic logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encapsulation error

A

has layer 3 packet to forward but is lacking layer 2 header element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ups

A

uninterruptable power supply. short term backup power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pdu

A

power distribution units. extension cord

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mttr

A

mean time to repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mtbf

A

mean time between failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cve

A

common vulnerabilities and exposures. list of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

least privelege

A

give bare minimum access to do their job

17
Q

rbac

A

role based access control. your rights and permissions are based on your role

18
Q

separation of duties

A

no user should be given enough privileges to misuse the system on their own

19
Q

EAP

A

Extensible Authentication Protocol. a framework designed to support multiple authentication protocols

20
Q

tailgating vs piggybacking

A

tailgating the person has no permission to follow.
piggybacking the person got permission to follow.

21
Q

site to site vpn

A

corporate network and a branch office network

22
Q

client to site vpn

A

connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate

23
Q

control place policing

A

allows for QoS configurations

24
Q

VNC

A

virtual network computing allows to control computer remotely and has screen sharing option
port 5900

25
access control vestibule
little room where one person has to go at a time also known as mantrap
26
plenum vs riser rated cabling
plenum cable is fire resistant and is put in places you cant see, can also be used in riser rated places.
27
RS232
signal sent throught db9 or db25 connectors.
28
straight thru vs crossover cable
difference is crossover cable has the pins inside flipped
29
EUI
Extended Unique Identifier (EUI-64) is a special address format that is basically MAC address but 64 bit for ipv6
30
wireless client isolation
Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another.