Term
_______ filter and forward traffic between two or more segments of a network based on the MAC address contained in data packets. |
|
Definition
|
|
Term
A _______ is hardware based and utilizes Application Specific Integrated Circuits(ASICs) to build and maintain MAC address tables. They use an Advanced Spanning-Tree control. |
|
Definition
|
|
Term
_______ are used for workgroup connectivity and network segmentation and are used as a general connectivity component (aggregation point) that connects network components such as computers, printers and switches together. |
|
Definition
|
|
Term
_______ provide the following basic functions: Hardware-based bridging(MAC), Wire Speed, Low Latency, Low Cost, and Broadcast Control. |
|
Definition
|
|
Term
The _______ on a switch allows direct local access to configure a switch using a dumb terminal or a computer running terminal emulation software (hyper terminal or putty) for initial config of a "blank" switch. Connect with a Console/Rollover cable; most be password protected. "External Component". |
|
Definition
|
|
Term
_______ are where you will connect your end devices such as your computers or printers. Can be used to "ping". Switches can also accept an incoming Telnet connection through this for remote management. "External Component". |
|
Definition
|
|
Term
In a switch the _______ will contain information like the diagnostic and boot up routines, this is the burned in memory that cannot be accessed or changed. |
|
Definition
|
|
Term
In a switch _______ is where the operating system (OS) is saved. Every time that the switch boots up the _______ will be accessed to load the OS into the running memory. |
|
Definition
|
|
Term
_______ is the running memory that the switch uses for all of it operations, when we make configuration changes on the switch it is stored here in a file called ‘running-configuration’. |
|
Definition
|
|
Term
_______ is what we will access to save our startup-configuration, along with other pieces of information that need long term storage in the switch. The ‘startup-configuration’ file is loaded to the RAM upon boot up and becomes the running-configuration with the entire configuration specific to that switch. |
|
Definition
|
|
Term
What device has the following 3 major functions: Address learning, Forward/Filter decision, and Loop Avoidance? |
|
Definition
|
|
Term
What is the process in which the frame on a switch is flooded(Broadcast) out on all active interfaces except the interface on which the frame was received? |
|
Definition
|
|
Term
When a frame arrives at a switch interface, the destination hardware address is compared to the forward/filter MAC database. If the destination hardware address is known and listed in the database, the frame is forwarded outonly on the correct interface. The switch does not transmit the frame out of any interface exceptfor the destination interface. This is calledframe filteringand helps to preserve bandwidth on the other network segments. |
|
Definition
Forwarding/Filtering Decision |
|
|
Term
What are the 3 methods in which frames can be forwarded on an internetwork? |
|
Definition
Store-and-forward, Cut-through, and Fragment Free |
|
|
Term
Switches or Bridges in a network environment can create what is referred to as a “single point of failure” in the topology. Toovercome this single point of failure it is a good idea to use multiple (redundant) links between switches or use multiple switches, this is _______. |
|
Definition
|
|
Term
Instability within the MAC address table can cause these 3 problems. |
|
Definition
Broadcast storms, multiple frame copies, and multiple loops. |
|
|
Term
If loop avoidance schemes are not put in place, the switches will flood broadcasts endlessly throughout the internetwork. |
|
Definition
|
|
Term
A device can receive multiple copies of the same frame because the frame can arrive from different segments at the same time. |
|
Definition
|
|
Term
It is possible that the switch can’tforward a frame because it is constantly updating the MAC filter table with source hardware address locations. This is called _______ the MAC table. |
|
Definition
|
|
Term
One of the biggest problems is _______ generating through an internetwork. |
|
Definition
|
|
Term
What is the protocol responsible for loop avoidance? |
|
Definition
STP spanning tree protocol |
|
|
Term
_______ is defined as a “logical” grouping of network devices into a single broadcast domain or flat network. |
|
Definition
|
|
Term
|
Definition
Increased Security, Flexibility and Scalability, no geographical barrier. |
|
|
Term
_______ (frame identification or encapsulation), uniquely assigns a user-defined trunking ID to each frame; this trunking ID will match the VLAN the traffic belongs to. The tag is placed on the frame as it enters the first switch it runs into. This is used to keep track of frames traversing a switch-fabric. |
|
Definition
|
|
Term
What are the two common trunking methods? |
|
Definition
Inter-switch link (ISL) cisco proprietary, and IEEE 802.1q defined open standard |
|
|
Term
The _______ is a network protocol that ensures a loop-free network by detecting and correcting loops. |
|
Definition
Spanning-Tree Protocol (STP), may also run across RSTP (Rapid Spanning-tree protocol) |
|
|
Term
Switches within a spanning tree instance use _______ for communication to determine root bridge selection and calculations and for synchronization. Each instance is controlled by a single Root Bridge, which is selected automatically using the _______ but the network administrator can help the selection process by changing the settings. |
|
Definition
Bridge Protocol Data Units (BPDUs) |
|
|
Term
The _______ is the layer 2 device (Switch or Bridge) that is in control of managing the Spanning-Tree Protocol. There can be only one _______ per STP Instance and all other switches are non-_______. All ports on the _______ are called designated ports and are set to “Forwarding” |
|
Definition
|
|
Term
Ports can be assigned one of three roles within a Spanning Tree Instance: |
|
Definition
Designated, Non- designated and Root ports |
|
|
Term
A _______ is a switchport that is active and forwarding traffic and each segment must have a designated port. |
|
Definition
Designated Ports (Forwarding Mode) |
|
|
Term
Provides a constant connection to the root bridge for the non-root bridge to receive advertisements and updates. This port is also forwarding traffic in the network. |
|
Definition
Root Ports (Forwarding & Listening Mode) |
|
|
Term
After a switch has determined the best path to the root bridge, all other ports are placed in the blocking state to prevent loops. |
|
Definition
Non-Designated Ports (Blocked) |
|
|
Term
_______ occurs when bridges and switches have completed the transition to reassign port states to either the forwarding or blocking mode. During this time no network traffic will be passed across the network because the switches are preoccupied with their computations. |
|
Definition
Convergence, normal time: 50s |
|
|
Term
What are the 4 port states? |
|
Definition
Blocking, listening, learning, and forwarding. |
|
|
Term
_______ provides a solution for network managers who require a higher bandwidth and redundancy between servers, routers, and switches than single-link Ethernet technology can provide. Provides incremental trunk speeds by combining multiple Fast Ethernet links up to 800Mbps, Gigabit Ethernet up to 8Gbps , 10 Gigabit Ethernet up to 80Gbps and 100 Gigabit Ethernet at speeds up to 800Gbps. |
|
Definition
Link Aggregation; IEEE 802.1AX |
|
|
Term
The advantages of link aggregation in contrast with conventional connections using an individual cable include: (3) |
|
Definition
Redundancy, higher potential transmission speed, higher accessibility. |
|
|
Term
To be able to use link aggregation, the following prerequisites must be fulfilled. All of the aggregated links must: (4) |
|
Definition
Be in full duplex mode•Use the same data transmission rates•Use parallel point-to-point connections•Connect to precisely one endpoint on a switch or server. |
|
|
Term
_______ provides automatic recovery when individual physical links fail. As long as one physical link exists, the connection will continue to exist. Can be configured with both active and passive control protocols. |
|
Definition
|
|
Term
_______ LACP is used to place the LACP ports in a passive negotiation state, which means that they will only accept LACP connections from others, and cannot initiate the connection. |
|
Definition
|
|
Term
Places the port in an active state of negotiation, where it will initiate connections with other LACP ports. |
|
Definition
|
|
Term
_______ is a Cisco proprietary version of Link-Aggregation described as having more than one link connected to a server, switch, or router and treating it like one logical link. This is a fault-tolerant technique that is becoming a common setup in highly available, core devices.Fundamentally it is the same as LACP but only used on Cisco devices. |
|
Definition
|
|
Term
_______ looks at the source and destination MAC address, source and destination IP address, source and destination port. |
|
Definition
|
|
Term
_______is a working group of the IEEE 802 project and is concerned with things such as LAN/MAN architecture, internetworking among LANs, MANs, and WANs, Link Security,overall network management and protocols above the Media Access Control (MAC) and Logical Link Control (LLC) layers. |
|
Definition
|
|
Term
_______is the name given to a subsection of the IEEE 802 standard that describes a software component of a computer network. It defines Logical Link Control (LLC), which is the upperportion of the data link layer of the OSI Model. The LLC sub layer presents a uniform interfaceto the user of the data link service, usually the network layer. Beneath the LLC sub layer is theMedia Access Control (MAC) sub layer, which is dependent on the particular medium being used such as Ethernet |
|
Definition
|
|
Term
_______ is a wireless computer network that links two or moredevices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building. |
|
Definition
Wireless local area network (WLAN) |
|
|
Term
The IEEE 802.11 has two basic modes of operation: |
|
Definition
ad hoc mode and infrastructure mode. |
|
|
Term
802.11 designers also included encryption mechanisms: _______,_______ to secure wireless computer networks. Many access points will also offer _______. |
|
Definition
Wired EquivalentPrivacy (WEP, now insecure), Wi-Fi Protected Access (WPA, WPA2), Wi-Fi Protected Setup |
|
|
Term
An _______network is a network where stations communicate only peer to peer (P2P). There is no base and no one gives permission to talk. This is accomplished using the Independent Basic Service Set (IBSS). |
|
Definition
|
|
Term
Wi-Fi Direct group. In one approach, the user sets up a P2P group owner manually. This method is also known as _______. |
|
Definition
Autonomous Group Owner (autonomous GO) |
|
|
Term
In the second method, also called _______, two devices compete based on the group owner intent value. The device with higher intent value becomes a group owner and the second device becomes a client. |
|
Definition
negotiation- based group creation |
|
|
Term
_______ enables the wireless interconnection of access points inan IEEE 802.11 network. |
|
Definition
A Wireless Distribution System (WDS) |
|
|
Term
The _______ is a set of all stations that can communicate with each other. Every _______ has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the _______. |
|
Definition
|
|
Term
An _______ is a set of connected BSSs. Access points in an _______ are connected by a distribution system. |
|
Definition
extended service set (ESS) |
|
|
Term
_______ is a set of specifications for implementing wireless local area networks (WLANs).They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997, and has had subsequent amendments. |
|
Definition
|
|
Term
_______ standard uses the same data link layer protocol and frame format as the originalstandard, but an OFDM based air interface (physical layer). It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic netachievable throughput in the mid-20 Mbit/s |
|
Definition
|
|
Term
_______ standard has a maximum raw data rate of 11 Mbit/s, and uses the same media access method defined in the original standard. 2.4 GHz. |
|
Definition
|
|
Term
This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput. |
|
Definition
|
|
Term
_______ is an amendment that improves upon the previous 802.11 standards by adding multiple- input multiple-output antennas (MIMO). _______ operates on both the 2.4 GHz and the lesser- used 5 GHz bands. Data rate: 54 Mbit/s to 600 Mbit/s. |
|
Definition
|
|
Term
_______ is an amendment to IEEE 802.11, published in December 2013, builds on 802.11n. Changes compared to 802.11n include wider channels (80 or 160 MHz versus 40 MHz) in the 5 GHz band, more spatial streams (up to eight versus four), higher-order modulation(up to 256-QAM vs. 64-QAM), and the addition of Multi-user MIMO (MU-MIMO). 1300 Mbit/s total, 80 MHz channels in the 5 GHz band. |
|
Definition
|
|
Term
_______ also referred to as "White-Fi" and "Super Wi-Fi", is an amendment, approved in February 2014, and allows WLAN operation in TV white space spectrum in the VHF and UHF bands between 54 and 790 MHz. It uses cognitive radio technology. The physical layer uses OFDM and is based on 802.11ac. The frequency channels are 6 to 8 MHz wide. |
|
Definition
|
|
Term
Increased mobility and collaboration •Roam without losing your connection•Connect hard-to-reach areas are what type of advantages? |
|
Definition
|
|
Term
Speed, Reliability, Security, Reduced Management Control are all what type of disadvantages? |
|
Definition
|
|
Term
_______ is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle,using a portable computer, smartphone or personal digital assistant (PDA). |
|
Definition
|
|
Term
_______ is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. May be used in conjunction with a rogue RADIUS server. |
|
Definition
|
|
Term
In order to detect _______, two conditions need to be tested:•Whether or not the access point is in the managed access point list•Whether or not it is connected to the secure network |
|
Definition
|
|
Term
_______ is the name assigned to a Wi-Fi (wireless) network. All devices in the network must use this case-sensitive name to communicate over Wi-Fi, which is a text string up to 32 bytes long. |
|
Definition
SSID or Service Set Identifier |
|
|
Term
In computer networking, _______ (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. |
|
Definition
|
|
Term
_______ is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. _______,recognizable by the key of 10 or 26 hexadecimal digits, was at one time widely in use and wasoften the first security choice presented to users by router configuration tools. |
|
Definition
Wired Equivalent Privacy (WEP) |
|
|
Term
The _______ protocol implements much of the IEEE 802.11i standard; specifically, the Temporal Key Integrity Protocol (TKIP). WEP used a 40-bit or 104-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the brute force type of attacks that compromised WEP. Also includes a message integrity check method called "Michael". |
|
Definition
Wi-Fi Protected Access (WPA) |
|
|
Term
_______, which requires testing and certification by the Wi-Fi Alliance,implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, _______ certification is mandatory for all new devices tobear the Wi-Fi trademark. |
|
Definition
|
|
Term
_______ is the process of capturing any data passed over the local network and looking for any information that may be useful. |
|
Definition
Packet sniffing, or packet analysis |
|
|
Term
_______ captures packets in real time and displays them in an easily readable format. _______ includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. It can be used to find and fix network problems such as latency, DNS issues or even web traffic. It can also be used to detect potential malicious traffic/programs and network intrusions while assisting you in locating and remediating those vulnerabilities. |
|
Definition
|
|
Term
_______is an application protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with _______ control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). |
|
Definition
|
|
Term
_______ is the secure form of Telnet. It functions the same but encrypts usernames and passwords before they are sent to protect sensitive user information. |
|
Definition
|
|
Term
_______ is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. 802.1X standard. |
|
Definition
Network Access Control (NAC) |
|
|
Term
_______is applied to access ports that connect to end user devices such as computers, printers, IP phones etc. It is a layer 2 access/traffic control feature that allows access for a specific MAC address. Network access for each port can be limited to a specified number of MAC addresses. This method of port security remembers the Ethernet MAC address connected to the switch port and allows only the MAC address(es) that are registered. If any other MAC address tries to communicate through the port, _______ will disable the port. |
|
Definition
Port-Security (Sticky-MAC) |
|
|