Upgrade to remove ads
Basic Routing and Switching
Terms in this set (58)
Convert 173 decimal to binary (8 bits)
When 0x precedes a number which numbering system is being implied?
0x2B in binary
The purpose of DNS server
Translates names (URL) into IP addresses
Purpose of a default gateway.
Allows hosts to communicate with hosts that are on different networks.
Purpose of a subnet mask
Used to determine the Network and Host portions of an IP address.
Purpose of DHCP server
Provides IP address configuration for hosts on a network.
DHCP configuration required for LAN and also remote device communication
IP address, Subnet Mask, Default Gateway address, DNS server address
Custom Subnet Mask
Created by borrowing Host bits and changing them to Network bits
Purpose of Custom Subnet Mask
Divides a Network into smaller ones of equal size
High bandwidth media used commonly for network backbone
Single mode fiber
High bandwidth media used commonly in point-to-point communications
Variable Length Subnet Mask - Subnetting a subnet mask into networks of different sizes to allow less waste of address space
Fixed Length Subnet Mask - Creating a single custom subnet mask that creates smaller networks of equal size
Virtual Private Network - an encrypted tunnel is setup between hosts and / or networks over the public Internet that addresses CIA for secure network communications. .
Layer 3 Switch
A Layer 3 switch is basically a switch that can perform routing functions in addition to switching.
Wireless Access Point
Used for connecting wireless devices such as tablets, smart phones, notebooks, laptops that support 802.11x. Other common references are WAP, AP, Access Point.
Refers to the family of 802.11 WLAN standards (examples 802.11b, 802.11g, 802.11a, 802.11n, 802.11ac, etc.)
A wireless local area network (WLAN) is a wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building
A device that connects two or more similar networks.
A device that connects two dissimilar networks.
A powerful computer that handles resources on a network.
Network Access Server (NAS)
A network access server (NAS) is a computer server that enables an independent service provider (ISP) to provide connected customers with Internet access.
Network Attached Storage (NAS)
Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients
Refers to a network device that allows wireless communication
A network that is created usually in software to allow testing of design before building in hardware
Refers to the number of ports on a network access device such as a switch
Hyper Text Transfer Protocol is an Application layer protocol
SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer. SSH also refers to the suite of utilities that implement the protocol.
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely.
A Windows sockets (Winsock) is an application programming interface (API) that allows for communication between Windows network software and network services, such as Transmission Control Protocol/Internet Protocol (TCP/IP). Winsock is based on the Berkeley Unix sockets interface.
Trivial File Transfer Protocol (TFTP) is a simple, lockstep, File Transfer Protocol which allows a client to get from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. It uses UDP and is not secure.
Access Control List - provides basic traffic filtering capabilities. Traffic into or out of a router interface can be contolled to permit or deny traffic based on IP addresses and/or port numbers.
An Acceptable Use Policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guide lines as to how it should be used
Syslog is a way for network devices to send event messages to a logging server - usually known as a Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log different types of events.
Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.
Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Extended Star Topology
allows packets to take different paths
Allows multiple users to connect to the same broadcast domain
Data, Segments, Packets, Frames Bits
Used to configure routers and switches without using network resources. Must be used to configure new routers and switches
Wireless security best practice
Change the default settings of a wireless AP
Maps a known IP address to an unknown MAC address
Maps a known MAC to an unknown IP Address
Local area network usually confined to a small space such as a room or a building. It is high speed and the most common type of protocol in use today is ethernet
Metropolitan area network is larger than a lan and usually
2 rules for abbreviating IPv6 addresses
1. Remove the leading zeroes in each hextet
2. Use "::" (double colons) to represent 2 or more consecutive all zeroes hextets. This can be done only once in an address.
A grouping of 16
3 names for representing 16 bits in IPv6
Block, Quartet, Hextet
THIS SET IS OFTEN IN FOLDERS WITH...
Cisco Routing and Switching Pro all chap…
Routing and Switching Essentials
Routing and Switching: DCHPv4
CCNA OSI & TCP/IP MODEL
YOU MIGHT ALSO LIKE...
IT essentials chapter 8
A+ essential chapter 7
3D052 Vol 1
Ports ITIM TCAT-Shelbyville
OTHER SETS BY THIS CREATOR
4.6 Corporate Data Security - Key Terms
4.5 Personal Data and Device Security - Key Terms
4.4 Security Concepts - Key Terms
4.3 Threats to Data