Vocab Flashcards

1
Q

AAAA
Authentication, Authorization, Accounting, Auditing

A

AAAA stands for Authentication, Authorization, Accounting, and Auditing, which are critical components of network security and management. Authentication verifies the identity of users or devices trying to access the network, ensuring that only authorized entities can gain entry. Authorization determines what resources an authenticated user is allowed to access, establishing permissions and roles based on the user’s identity. Accounting involves tracking user activities and resource usage, providing a record of actions taken on the network. Auditing refers to the process of reviewing and analyzing these records to ensure compliance with security policies and to detect any unauthorized access or anomalies.

For the exam, you should be able to explain the differences between each component and their importance in maintaining a secure network. Understanding how these elements work together to form a robust security framework is essential. Familiarity with specific protocols and tools used for AAA, such as RADIUS and TACACS+, will be helpful. You may also need to recognize scenarios where AAA can enhance security and identify best practices for implementing these controls effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BNC British Naval Connector/Bayonet Neill-Concelman

A

A BNC (Bayonet Neill-Concelman) connector is a type of coaxial cable connector commonly used for video and RF (radio frequency) applications. It features a bayonet mount that allows for quick and secure connections. BNC connectors are often found in applications like video surveillance, television, and baseband video signals. The design of the BNC connector provides good signal integrity and is typically used for 75-ohm cables in broadcast and video applications.

For the exam, you should know the applications of BNC connectors, particularly in video systems and networking environments. Be aware of the differences between 50-ohm and 75-ohm versions of BNC connectors and the contexts in which each is used. Understanding how to properly install and troubleshoot BNC connections is also important, especially in environments where video and data integrity are critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAM Content Addressable Memory (table)

A

Content Addressable Memory (CAM) is a type of memory used in networking devices, particularly in switches and routers, to store data that can be retrieved based on its content rather than its address. CAM allows for faster data lookup by enabling the system to search through its stored values and retrieve a match without needing to access memory sequentially. This feature makes CAM especially useful for operations such as MAC address lookup in Ethernet switches, where rapid access to address information is crucial for forwarding decisions.

For the exam, you should know that CAM is used primarily for high-speed data retrieval and can significantly improve the performance of devices like switches by allowing them to quickly identify and direct data packets based on their destination addresses. It’s important to differentiate CAM from traditional memory types, as CAM can perform parallel searches across all stored entries. Additionally, be aware of its limitations, such as higher cost and power consumption compared to standard RAM, which may influence the design choices of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CLI Command-Line Interface

A

The Command-Line Interface (CLI) is a text-based interface used to interact with computer systems and network devices. It allows users to execute commands by typing them in, as opposed to using graphical interfaces. CLI is commonly utilized in networking equipment, servers, and operating systems because it offers a powerful way to configure and manage systems efficiently. CLI commands often allow for batch processing and scripting, enabling administrators to automate repetitive tasks.

For the exam, you should understand that CLI is essential for configuring routers, switches, and firewalls in networking. Familiarity with common CLI commands, such as those used for configuring interfaces, viewing device statuses, and troubleshooting, is crucial. It’s also helpful to know about different CLI environments like Cisco IOS or Linux shell, as they may have unique command syntax and structures. Being comfortable with CLI can greatly enhance your ability to manage and troubleshoot network devices effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSMA/CA
Carrier-Sense Multiple Access with Collision Avoidance

A

Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol used to manage how devices share a communication channel in wireless networks. It aims to prevent data collisions by ensuring that devices listen to the channel before transmitting data. If the channel is clear, the device will send its data. However, if the channel is busy, the device will wait and try again after a random period. CSMA/CA is particularly important in wireless networks, where collisions can lead to significant data loss and retransmission delays.

For the exam, it’s important to know that CSMA/CA is a key protocol used in wireless standards like IEEE 802.11 (Wi-Fi). Understand the process of how devices check for channel availability and the importance of techniques like acknowledgment frames to confirm successful data transmission. You should also be familiar with the differences between CSMA/CA and its counterpart CSMA/CD (Carrier-Sense Multiple Access with Collision Detection), which is used in wired networks. Knowing these concepts will help you understand how network traffic is managed in various environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSU Channel Service Unit

A

A Channel Service Unit (CSU) is a device that connects end-user equipment to a digital circuit, such as a T1 or E1 line. Its primary function is to convert the digital signal from the user’s equipment to a format suitable for transmission over the telecommunications network. The CSU provides line monitoring, diagnostic capabilities, and protection against electrical interference. It often includes features such as signal regeneration and loopback testing to ensure the integrity of the connection.

For the exam, it’s important to understand that the CSU typically works in conjunction with a Data Service Unit (DSU), forming a CSU/DSU unit. This combination is essential for establishing a reliable connection to the service provider’s network. You should be familiar with its role in ensuring proper signal transmission and its importance in maintaining network stability and performance. Knowing about CSUs will help you grasp the concepts of leased lines and their operational requirements in network configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DSU Data Service Unit

A

A Data Service Unit (DSU) is a device that connects end-user equipment to a digital transmission line, such as a T1 or E1 circuit. Its primary role is to convert the digital signals from the user’s network equipment into a format suitable for transmission over the telecommunication network. The DSU typically works alongside a Channel Service Unit (CSU), forming a CSU/DSU pair, which provides essential functions for maintaining the integrity of the connection.

For the exam, it’s crucial to understand that the DSU performs line conditioning and signal regeneration to ensure reliable data transmission. It also offers diagnostic capabilities, such as loopback testing, to troubleshoot connectivity issues. Knowing the function of a DSU will help you comprehend the operational requirements of leased lines and their significance in ensuring effective communication between user devices and the service provider’s network. Familiarity with CSU/DSU configurations is important for understanding the broader concepts of WAN connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EIA Electronic Industries Association

A

The Electronic Industries Association (EIA) is a trade organization that represents the interests of the electronics industry in the United States. Established in the early 20th century, the EIA develops industry standards, provides advocacy for policies affecting the electronics sector, and facilitates communication among its members. The organization has played a crucial role in promoting technology and fostering innovation in various fields, including telecommunications and computer systems.

For the exam, it’s essential to recognize that the EIA has been involved in establishing standards for cabling and connectivity, notably in the development of the EIA/TIA (Telecommunications Industry Association) standards, which define specifications for telecommunications infrastructure. Understanding the role of EIA and its impact on industry standards can help you appreciate how standardized practices contribute to interoperability and reliability in networking and telecommunications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HA High Availability

A

High Availability (HA) refers to the design and implementation of systems that ensure a higher level of operational performance for a longer period of time. In the context of networking and IT infrastructure, HA aims to minimize downtime and provide continuous access to services. This is achieved through redundancy, failover mechanisms, and robust configurations that prevent single points of failure.

For the exam, it’s important to understand key concepts related to HA, such as clustering, load balancing, and redundant systems. Familiarize yourself with terms like failover, where backup systems take over in the event of a failure, and the differences between active-active and active-passive configurations. Recognizing how HA contributes to business continuity and the user experience will help solidify your knowledge on the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MDIX Medium Dependent Interface Crossover

A

Medium Dependent Interface Crossover (MDIX) is a standard that specifies how Ethernet devices can automatically configure themselves to communicate over a network by adjusting the pinouts of their connections. MDIX helps in connecting devices without needing to manually configure or use crossover cables. This technology is particularly useful in environments where devices, such as switches and routers, frequently connect to various other devices.

For the exam, you should understand the significance of MDIX in simplifying network connections and reducing the potential for cabling errors. Be familiar with the difference between MDIX and standard Ethernet configurations, including the implications of using crossover versus straight-through cables. Knowing how MDIX enhances network reliability by accommodating different cabling scenarios will also be beneficial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MT-RJ Mechanical Transfer - Registered Jack

A

Mechanical Transfer-Registered Jack (MT-RJ) is a type of fiber optic connector that uses a compact design to connect two fibers in a single connector. It features a push-pull mechanism for easy insertion and removal, making it user-friendly for installation and maintenance. MT-RJ connectors are often used in data centers and telecommunications networks due to their space-saving benefits and efficiency in managing fiber connections.

For the exam, you should be aware of the MT-RJ’s physical characteristics and its advantages over other connectors, such as SC and LC. Understanding the applications of MT-RJ in high-density fiber installations, along with its performance specifications, will be important. Be prepared to discuss how MT-RJ connectors contribute to reducing cable clutter while maintaining effective signal transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NGFW Next-Generation Firewall

A

Next-Generation Firewall (NGFW) is an advanced network security device that provides more sophisticated filtering and protection than traditional firewalls. NGFWs combine essential features like packet filtering, stateful inspection, and deep packet inspection with advanced functionalities such as intrusion prevention systems (IPS), application awareness, and cloud-delivered threat intelligence. This multifaceted approach enables organizations to detect and respond to complex threats in real-time.

For the exam, it’s crucial to understand the key features of NGFWs, such as their ability to identify and control applications, enforce security policies at a granular level, and integrate with other security tools for comprehensive protection. Be familiar with how NGFWs differ from traditional firewalls, particularly regarding their enhanced capability to combat modern threats like malware and advanced persistent threats (APTs). Additionally, recognize their role in supporting secure access to cloud services and protecting sensitive data across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

POP3 Post Office Protocol version 3

A

Post Office Protocol version 3 (POP3) is a standard email protocol used by email clients to retrieve messages from a mail server. POP3 allows users to download their emails to their local devices, providing offline access to their messages. This protocol operates on a client-server model, where the email client connects to the server, authenticates the user, and then retrieves messages. By default, POP3 typically removes emails from the server once they are downloaded, although some configurations can keep a copy on the server.

For the exam, it’s important to understand the basic functionality of POP3, including its purpose in the email retrieval process. Be aware of its limitations, such as the inability to manage emails directly on the server after download, which contrasts with other protocols like IMAP (Internet Message Access Protocol). Familiarity with common POP3 ports—port 110 for unencrypted communication and port 995 for encrypted communication using SSL/TLS—will also be beneficial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly