Term
What does modem stand for? |
|
Definition
|
|
Term
|
Definition
Converts analog to digital and digital to analog |
|
|
Term
What are modems commonly used for now? |
|
Definition
|
|
Term
What are the limitations of a modem? |
|
Definition
Limited frequencies and limited bandwidth |
|
|
Term
|
Definition
|
|
Term
|
Definition
Repeats and regenerates a signal |
|
|
Term
What OSI layer does a repeater operate on? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the speed range for a hub? |
|
Definition
|
|
Term
Which OSI layer do hubs operate on? |
|
Definition
|
|
Term
|
Definition
Connects different physical networks |
|
|
Term
A Bridge distributes traffic based on ________________. |
|
Definition
|
|
Term
What OSI layer do bridges operate on? |
|
Definition
|
|
Term
In a switch, bridging is done in _____________. |
|
Definition
|
|
Term
What does ASIC stand for? |
|
Definition
Application Specific Integrated Circuit |
|
|
Term
What OSI layer do switches operate on? |
|
Definition
|
|
Term
What is today's standard in networking infrastructure? |
|
Definition
|
|
Term
|
Definition
A wireless acces point, essentially a bridge with wireless capability |
|
|
Term
What OSI layer does a WAP operate on? |
|
Definition
|
|
Term
|
Definition
Routes traffic between IP subnets |
|
|
Term
What OSI Layer does a router operate on? |
|
Definition
|
|
Term
What is a common secondary name for a router? |
|
Definition
|
|
Term
What do we call a device that filters traffic by port number? |
|
Definition
|
|
Term
What OSI Layer do Firewalls operate on? |
|
Definition
|
|
Term
Where are firewalls normally located? |
|
Definition
At the egress/ingress point |
|
|
Term
What kind of device can encrypt traffic coming in and out of the network, and proxy traffic? |
|
Definition
|
|
Term
What does a DHCP server do? |
|
Definition
Automatically assigns IP addresses |
|
|
Term
What is the difference between an IDS and an IPS? |
|
Definition
an IDS provides an alarm or alert of an intrusion, whereas an IPS stops an intrusion |
|
|
Term
|
Definition
An exploit against a system |
|
|
Term
|
Definition
Intrusion Detection System |
|
|
Term
|
Definition
Intrusion Prevention System |
|
|
Term
What type of device will distribute a load over a cluster of servers? |
|
Definition
|
|
Term
What is a method of load balancing that distributes a load based on content? |
|
Definition
|
|
Term
What do we call a device that is a switch, router, firewall, load balancer, content switch, IDP/IPS, etc. combined into one device? |
|
Definition
|
|
Term
What does a DNS server do? |
|
Definition
Converts domain names to IP addresses and vice versa |
|
|
Term
What is the name of a device that can set priorities on bandwidth for applications and can manage QoS? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What is a device that sits between the user and the internet and is able to cache information? |
|
Definition
|
|
Term
What is used to connect routers to a WAN link? |
|
Definition
|
|
Term
What does CSU/DSU stand for? |
|
Definition
Channel Service Unit/Data Service Unit |
|
|
Term
|
Definition
|
|
Term
What is the voltage provided by PoE? |
|
Definition
|
|
Term
What is the amperage provided by PoE? |
|
Definition
|
|
Term
What is the maximum load of PoE? |
|
Definition
|
|
Term
Which PoE mode uses the pairs of wires not used for data? |
|
Definition
|
|
Term
What pairs does PoE mode A use? |
|
Definition
|
|
Term
What pairs does mode B use? |
|
Definition
|
|
Term
What is STP designed to prevent? |
|
Definition
loops in switched/bridged networks |
|
|
Term
|
Definition
|
|
Term
What OSI layer does STP operate on? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What does RSTP stand for? |
|
Definition
Rapid Spanning Tree Protocol |
|
|
Term
What is the STP convergence time? |
|
Definition
|
|
Term
What is the RSTP convergence time? |
|
Definition
|
|
Term
In STP, what do we call the bridge with the lowest number? |
|
Definition
|
|
Term
In STP, what are the three types of ports? |
|
Definition
Root Port, Designated Port, and Blocked Port |
|
|
Term
|
Definition
Access, Security, and Changes |
|
|
Term
What do we call the practice of having multiple VLANs on a single wire? |
|
Definition
|
|
Term
What is the Trunking protocol? |
|
Definition
|
|
Term
What practice duplicates traffic on a physical port and sends a copy to an analyzer (SPAN)? |
|
Definition
|
|
Term
What does SPAN stand for? |
|
Definition
|
|
Term
What is the standard for physical port authentication? |
|
Definition
|
|
Term
What methods do 802.1x authentications use? |
|
Definition
|
|
Term
What does RADIUS stand for? |
|
Definition
Remote Access Dial In User Service |
|
|
Term
What does TACSACS+ stand for? |
|
Definition
Terminal Access Controller Access Control System Plus |
|
|
Term
What is the Windows default built in wireless configuration? |
|
Definition
|
|
Term
What three Wireless channels do we use in the US to prevent interference? |
|
Definition
|
|
Term
What does ESSID stand for? |
|
Definition
Extended Service Set Identification |
|
|
Term
What are the three major metrics for verifying wireless installations? |
|
Definition
Signal coverage, Potential Interference, Spectrum Analyzer |
|
|