Term
|
Definition
allows for the segregation of hosts and segments, while managing broadcast traffic. |
|
|
Term
|
Definition
designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity |
|
|
Term
|
Definition
tests network connectivity while showing you each hop along the way and the degree of packet loss |
|
|
Term
stateful packet inspection |
|
Definition
used in firewalls and keeps tracks of conversations so that it knows what to allow back into a network |
|
|
Term
|
Definition
used to display NetBIOS over TCP/IP statistics |
|
|
Term
differences between IPv4 and IPv6 |
|
Definition
IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.
And IPv4 addresses are represented In a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format.
|
|
|
Term
|
Definition
popular link-state protocol used within a large organization
|
|
|
Term
|
Definition
most secure encryption used in wireless networks |
|
|
Term
|
Definition
displaysroute that is taken by IP packet as they move across networks |
|
|
Term
|
Definition
used with L2TP to encrypt data |
|
|
Term
|
Definition
is included in the TCP/IP model |
|
|
Term
|
Definition
used to create a connectionso that a host can transfer files |
|
|
Term
advantage of a Star network |
|
Definition
when you connect or remove devices on the Star network, there are no interruptions. |
|
|
Term
CSMA/CA to access the network |
|
Definition
|
|
Term
|
Definition
used to publish external websites for an organization |
|
|
Term
|
Definition
reduce the number of nodes in a broadcast domain |
|
|
Term
ports are defined above 49,152 as? |
|
Definition
|
|
Term
A______network manages the connectivity between workstations without the need of a central node |
|
Definition
|
|
Term
The ____layer in the OSI model covers HTTP, FTP, and RDC
|
|
Definition
|
|
Term
clears the NetBIOS name cache table |
|
Definition
|
|
Term
MAC addresses and switches use the_______ layer in the OSI model
|
|
Definition
|
|
Term
a network of multiple private networks connected together for the purpose of sharing resources |
|
Definition
|
|
Term
used to translate IP addresses to MAC addresses |
|
Definition
|
|
Term
|
Definition
the most popular distance-vector routing algorithm used to determine the best routes within a network |
|
|
Term
|
Definition
allows the ping command to keep sending Echo Request messages to the ISP server until interrupted. |
|
|
Term
|
Definition
used to detect malicious network activities and reports only those issues to the administrator |
|
|
Term
ARP naming resolution protocol |
|
Definition
solely relies on the IP-to-Physical address translation tables
|
|
|
Term
the greatest advantage mesh topology has over star, bus or ring topologies
|
|
Definition
|
|
Term
|
Definition
used to connect to a remote computer so that you can execute commands
|
|
|
Term
|
Definition
acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future |
|
|
Term
|
Definition
is used to display active TCP or UDP connections |
|
|
Term
Ping localhost, Ping 127.0.0.1, and Ping loopback |
|
Definition
are used to test the TCP/IP stack on a computer
|
|
|
Term
Lightweight Directory Access Protocol (LDAP) |
|
Definition
used to locateresources on a network |
|
|