Study sets matching "network chapter 6"

Study sets
Classes
Users

Study sets matching "network chapter 6"

46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
86 terms
Network+ Chapter 6
802.1D
802.1q
802.1w
access port
The IEEE standard that describes, among other things, bridgin…
The IEEE standard that specifies how VLAN and trunking inform…
The IEEE standard that describes RSTP (Rapid Spanning Tree Pr…
The interface on a switch used for an end node. Devices conne…
802.1D
The IEEE standard that describes, among other things, bridgin…
802.1q
The IEEE standard that specifies how VLAN and trunking inform…
Network + Chapter 6
Host-to-host Layer
Process/Application layer
Host-to-host Layer
Host-to-host Layer
Layer in the DoD model that is the same as the Transport Layer.
Layer in the DoD model that defines protocols for node-to-nod…
Layer in the DoD model that parallels the Transport Layer def…
Layer in DoD model that creates reliable end-to-end communica…
Host-to-host Layer
Layer in the DoD model that is the same as the Transport Layer.
Process/Application layer
Layer in the DoD model that defines protocols for node-to-nod…
33 terms
Network+ Chapter 6
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
12 terms
Chapter 6: Network Layer
Routing
Decapsulation
Media independent
Connectionless
The process by which a router receives an incoming frame, dis…
A process by which an end device, after it receives data over…
The networking layers whose processes are not affected by the…
Term used to describe data transfer without the existence of…
Routing
The process by which a router receives an incoming frame, dis…
Decapsulation
A process by which an end device, after it receives data over…
68 terms
Network+ Chapter 6 Wireless Networking
WLANs (wireless local area networks)
wireless spectrum
True
ITU (International Telecommunication U…
Networks that transmit signals through the air via radio freq…
The ________ is a continuum of the electromagnetic waves used…
The wireless spectrum (as defined by the FCC, which controls…
The ________ is a United Nations agency that sets standards f…
WLANs (wireless local area networks)
Networks that transmit signals through the air via radio freq…
wireless spectrum
The ________ is a continuum of the electromagnetic waves used…
26 terms
Chapter 6 Network+
What is the difference between solid c…
How wide is an equipment rack as a sta…
What is a smaller telecommunications r…
What is the main telecommunication roo…
Solid core is one solid metal wire core. Stranded core is mad…
19 inches
Intermediate Distribution Frame (IDF)
Main Distribution Frame (MDF)
What is the difference between solid c…
Solid core is one solid metal wire core. Stranded core is mad…
How wide is an equipment rack as a sta…
19 inches
40 terms
Network+ Guide to Networks - Chapter 6
False
True
False
True
T/F: IBM began developing the FireWire standard in the 1980s.
T/F: CompactFlash NICs are most frequently used to connect de…
T/F: It is best to perform connectivity tests on a computer c…
T/F: Bridges are protocol independent.
False
T/F: IBM began developing the FireWire standard in the 1980s.
True
T/F: CompactFlash NICs are most frequently used to connect de…
14 terms
Chapter 6 - Installing a Physical Network
Horizontal Cabling
Run
Solid Core UTP
Stranded Core
the cabling that goes more or less horizontally from a work a…
A single piece of cable that runs from a work area to a telec…
A better conductor, but stiff and will break if handled too o…
Not quite as good of a conductor as solid core, but will stan…
Horizontal Cabling
the cabling that goes more or less horizontally from a work a…
Run
A single piece of cable that runs from a work area to a telec…
Network+ Chapter 6 Study Guide
False
True
False
True
(T/F) IBM began developing the FireWire standard in the 1980s.
(T/F) CompactFlash NICs are most frequently used to connect d…
(T/F) It is best to perform connectivity tests on a computer…
(T/F)Bridges are protocol independent.
False
(T/F) IBM began developing the FireWire standard in the 1980s.
True
(T/F) CompactFlash NICs are most frequently used to connect d…
Chapter 6: Network Layer
Routing
Decapsulation
Media independent
Connectionless
The process by which a router receives an incoming frame, dis…
A process by which an end device, after it receives data over…
The networking layers whose processes are not affected by the…
Term used to describe data transfer without the existence of…
Routing
The process by which a router receives an incoming frame, dis…
Decapsulation
A process by which an end device, after it receives data over…
87 terms
Network Chapter 6
Routing
Routes
Comparing Routing and Stitching
IP Data Packet Delivery Process
the process of selecting the best route for transferring a pa…
Is the path used by data packets to reach the specified desti…
Routers are designed to interconnect multiple networks and su…
1) The data payload had been prepared by either the Transmiss…
Routing
the process of selecting the best route for transferring a pa…
Routes
Is the path used by data packets to reach the specified desti…
19 terms
Networking Chapter 6 - Working With Network Services
Acknowledge
APIPA
authentication header (AH)
Discovery
When the DHCP server sends a final unicast to the client that…
Short for Automatic Private IP Address, this is a private ran…
An IPSec component that provides connectionless integrity and…
A step in DORA when a client computer broadcasts out to the n…
Acknowledge
When the DHCP server sends a final unicast to the client that…
APIPA
Short for Automatic Private IP Address, this is a private ran…
10 terms
Chapter 6 - Installing a Physical Network Acronyms
IDF
NIU
MDF
U
Intermediate distribution frame
Network interface unit
Main Distribution Frame
A rack mount equipment height measurement known simply as a u…
IDF
Intermediate distribution frame
NIU
Network interface unit
46 terms
Chapter 6 - Network Security
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
40 terms
Chapter 6 Network Security
A basic level of security can be achie…
The OSI model breaks networking steps…
Behavior-based monitoring attempts to…
Security is enhanced by subnetting a s…
True
False
True
True
A basic level of security can be achie…
True
The OSI model breaks networking steps…
False
Network Security - Chapter 6 - Network Security
Which of the following is true about s…
A virtual LAN (VLAN) allows devices to…
Which of the following devices is easi…
Which of the following is not an attac…
It is also called subnet addressing
logically
hub
ARP address impersonation
Which of the following is true about s…
It is also called subnet addressing
A virtual LAN (VLAN) allows devices to…
logically
13 terms
Chapter 6 - Network
Bridges
Switching
Store-and-forward
Cut through
Devices that connect two network segments by analyzing MAC ad…
Connectivity devices that subdivide a network into smaller lo…
A switch reads the entire data frame into its memory and chec…
A switch that reads a frame's header and decides where to for…
Bridges
Devices that connect two network segments by analyzing MAC ad…
Switching
Connectivity devices that subdivide a network into smaller lo…
71 terms
network+ chapter 6
wireless spectrum
radiation pattern
unidirectional antenna
omnidirectional antenna
continuum of the electronagnetic waves used for data and voic…
relative strength over a three dimensional area of all the el…
issues wireless signals along a single direction
issues and receives wireless signals with equal strength in a…
wireless spectrum
continuum of the electronagnetic waves used for data and voic…
radiation pattern
relative strength over a three dimensional area of all the el…
33 terms
Network+ Chapter 6
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
Network Layer: Chapter 6
What are two functions that are provid…
Which key combination allows a user to…
Within a production network, what is t…
Which value, that is contained in an I…
providing end devices with a unique network identifier ... dire…
ctrl+c
The default gateway address is used to forward packets origin…
Time-to-live
What are two functions that are provid…
providing end devices with a unique network identifier ... dire…
Which key combination allows a user to…
ctrl+c
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
Network+ Guide to Networks - Chapter 6
data transreceiver
PCI
lanes
external
Nearly all NICs contain a(n) ____, the device that transmits…
By far, the most popular expansion board NIC is one that uses…
PCIe slots vary depending on the number of ____ they support.
CompactFlash is an example of a peripheral device attached to…
data transreceiver
Nearly all NICs contain a(n) ____, the device that transmits…
PCI
By far, the most popular expansion board NIC is one that uses…
77 terms
Chapter 6 - Networking
Host
Peripheral
LAN
WLAN
any device that sends or receives information
any device connected to a host
group of computers under one administrative control
group of wireless devices that connect to access points
Host
any device that sends or receives information
Peripheral
any device connected to a host
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
19 terms
CHAPTER 6 NETWORKS Networking
LAN
WAN
Topology
Bus
A collection of computers and peripheral devices connected to…
A collection of computers and LANs connected together over a…
A description of how devices are connected together. Does not…
A topology where each device is connected to a main cable, re…
LAN
A collection of computers and peripheral devices connected to…
WAN
A collection of computers and LANs connected together over a…
30 terms
Network Security - Chapter 6 - Network Security
Which of the following is true about s…
A virtual LAN (VLAN) allows devices to…
Which of the following devices is easi…
Which of the following is not an attac…
It is also called subnet addressing
logically
hub
ARP address impersonation
Which of the following is true about s…
It is also called subnet addressing
A virtual LAN (VLAN) allows devices to…
logically
Chapter 6: Installing an Physical Network
All the cabling from individual work a…
The central location that all cabling…
A single piece of installed horizontal…
The set of standards established by th…
Horizonal cabling
Telecommunications room
Run
606
All the cabling from individual work a…
Horizonal cabling
The central location that all cabling…
Telecommunications room
40 terms
Network+ Guide to Networks - Chapter 6
False
True
False
True
T/F: IBM began developing the FireWire standard in the 1980s.
T/F: CompactFlash NICs are most frequently used to connect de…
T/F: It is best to perform connectivity tests on a computer c…
T/F: Bridges are protocol independent.
False
T/F: IBM began developing the FireWire standard in the 1980s.
True
T/F: CompactFlash NICs are most frequently used to connect de…
25 terms
Network+ - Chapter 6 - Review
If you purchase a new desktop computer…
If you purchase a new laptop today, wh…
Which two of the following IRQs could…
A certain computer on your Fast Ethern…
PCI
On-board
9 11
By modifying the NIC properties through the operating system
If you purchase a new desktop computer…
PCI
If you purchase a new laptop today, wh…
On-board
Network+ Chapter 6 Review
Which of the following utilities could…
Which of the following is a significan…
You and a friend decide to set up Fast…
You are a network technician working o…
ethtool
The SFP can be added or removed without affecting operations,…
Filter traffic based on IP address.
None of its LEDs are lit.
Which of the following utilities could…
ethtool
Which of the following is a significan…
The SFP can be added or removed without affecting operations,…
86 terms
Network+ Guide to Networks - Sixth Edition - Chapter 6 Key Terms
802.1D
802.1q
802.1w
access port
The IEEE standard that describes, among other things, bridgin…
The IEEE standard that specifies how VLAN and trunking inform…
The IEEE standard that describes RSTP (Rapid Spanning Tree Pr…
The interface on a switch used for an end node. Devices conne…
802.1D
The IEEE standard that describes, among other things, bridgin…
802.1q
The IEEE standard that specifies how VLAN and trunking inform…
19 terms
CHAPTER 6 NETWORKS Networking
LAN
WAN
Topology
Bus
A collection of computers and peripheral devices connected to…
A collection of computers and LANs connected together over a…
A description of how devices are connected together. Does not…
A topology where each device is connected to a main cable, re…
LAN
A collection of computers and peripheral devices connected to…
WAN
A collection of computers and LANs connected together over a…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
10 terms
Network Operating Systems and Network Communications - Chapter 6
Which of the following is the UNC form…
Which protocol is designed to match IP…
How can you reduce netwrok collisions?
Which protocol serves the same purpose…
\\Server1\MyFiles
ARP
Segment the network using switches
LLMNR
Which of the following is the UNC form…
\\Server1\MyFiles
Which protocol is designed to match IP…
ARP
19 terms
CHAPTER 6 NETWORKS Networking
LAN
WAN
Topology
Bus
A collection of computers and peripheral devices connected to…
A collection of computers and LANs connected together over a…
A description of how devices are connected together. Does not…
A topology where each device is connected to a main cable, re…
LAN
A collection of computers and peripheral devices connected to…
WAN
A collection of computers and LANs connected together over a…
61 terms
Network+ Chapter 6 Routing IP Packets
ARP
Address Resolution Protocol
Time To Live
TTL
Protocal in which a request is a broadcast asking for the MAC…
ARP
TTL
This field in an IP header is decremented once for each route…
ARP
Protocal in which a request is a broadcast asking for the MAC…
Address Resolution Protocol
ARP
32 terms
CIS 250: Chapter 6 Network Layer
Routing
connectionless
Best effort
Media independent
Provides services to direct packets to a destination host on…
No connection with the destination is established before send…
Packet delivery is not guaranteed
Operation is independent of the medium carrying data
Routing
Provides services to direct packets to a destination host on…
connectionless
No connection with the destination is established before send…
33 terms
Network+ Guide to Networks Chapter 6 - RQ
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
13 terms
Chapter 6: Network Effects
network effects
staying power
switching cost
total cost of ownership (TCO)
(Metcalfe's Law, network externalities) when a product/servic…
the long-term viability of a P/S
the cost a consumer incurs when switching from one product to…
economic measure of the full cost of owning a product (i.e. c…
network effects
(Metcalfe's Law, network externalities) when a product/servic…
staying power
the long-term viability of a P/S
Chapter 6: network layer
End to end transport process
Protocols
Encapsulating the IP
What's the header for?
Adressee end device, encapsates, routes, and de-encapsulates
IPv4 and IPv6
The transport layer adds a header so segments can be reassemb…
So packets can be routed through complex networks and reach t…
End to end transport process
Adressee end device, encapsates, routes, and de-encapsulates
Protocols
IPv4 and IPv6
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
15 terms
Chapter 6 Network Security
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Heuristic Monitoring
Compares baseline and raises alert if anything is not consist…
Compares normal processes and actions
Separate network that rests outside the secure network
Uses an algorithm to determine if a treat exists
Anomaly-Based Monitoring
Compares baseline and raises alert if anything is not consist…
Behavior-Based Monitoring
Compares normal processes and actions
20 terms
Network Security - Chapter 6
D. it is also called subnet addressing
B. logically
A. hub
B. ARP address impersonation
Which of the following is true about subnetting?... A. it requir…
A virtual LAN (VLAN) allows devices to be grouped __________.…
Which of the following devices is easier for an attacker to t…
Which of the following is not an attack against a switch?... A.…
D. it is also called subnet addressing
Which of the following is true about subnetting?... A. it requir…
B. logically
A virtual LAN (VLAN) allows devices to be grouped __________.…
25 terms
Chapter 6: Network Communications and Protocols
What are two main reasons why data mus…
When the network operating system at t…
What are the 3 basic parts of a Packet…
What is Packet Creation?
1) large amounts of data sent as one large unit ties up the n…
1) Send the original, disassembled data in small chunks.... 2)…
1) Header: usually contains the source and destination addres…
packet creation process begins at the Application layer of th…
What are two main reasons why data mus…
1) large amounts of data sent as one large unit ties up the n…
When the network operating system at t…
1) Send the original, disassembled data in small chunks.... 2)…
30 terms
Chapter 6 Network Security
____ can be used to ensure the integri…
____ can verify the authenticity of th…
A(n) ____ serves as the top trusted th…
The ____ function is a subordinate ent…
Hashing
Asymmetric encryption
CA
Registration Authority
____ can be used to ensure the integri…
Hashing
____ can verify the authenticity of th…
Asymmetric encryption
35 terms
Network Security Chapter 6
basic firewall operation
problem with traffic overload
firewall capacity
wire speed
1. legitimate hosts send more innocent packets, attackers sen…
if a firewall cannot filter all of the traffic passing throug…
must be able to handle incoming traffic at wire speed
the maximum speed of data coming into each port
basic firewall operation
1. legitimate hosts send more innocent packets, attackers sen…
problem with traffic overload
if a firewall cannot filter all of the traffic passing throug…
69 terms
Chapter 6 Network Hardware, Switching, Routing
Access Port
Application Switch
Backplane
Best Path
The interface on a switch used for an end node.
A switch that provides functions between Layer 4 and Layer 7…
A synonym for motherboard, often used in the context of switc…
The most efficient route from one node on a network to another.
Access Port
The interface on a switch used for an end node.
Application Switch
A switch that provides functions between Layer 4 and Layer 7…
1 of 10