How can we help?

You can also find more resources in our Help Center.

Study sets matching "network chapter 6"

Study sets
Classes
Users

Study sets matching "network chapter 6"

12 terms
Chapter 6: Network Layer
Routing
Decapsulation
Media independent
Connectionless
The process by which a router receives an incoming frame, dis…
A process by which an end device, after it receives data over…
The networking layers whose processes are not affected by the…
Term used to describe data transfer without the existence of…
Routing
The process by which a router receives an incoming frame, dis…
Decapsulation
A process by which an end device, after it receives data over…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
87 terms
Network Chapter 6
Routing
Routes
Comparing Routing and Stitching
IP Data Packet Delivery Process
the process of selecting the best route for transferring a pa…
Is the path used by data packets to reach the specified desti…
Routers are designed to interconnect multiple networks and su…
1) The data payload had been prepared by either the Transmiss…
Routing
the process of selecting the best route for transferring a pa…
Routes
Is the path used by data packets to reach the specified desti…
86 terms
Network+ Chapter 6
802.1D
802.1q
802.1w
access port
The IEEE standard that describes, among other things, bridgin…
The IEEE standard that specifies how VLAN and trunking inform…
The IEEE standard that describes RSTP (Rapid Spanning Tree Pr…
The interface on a switch used for an end node. Devices conne…
802.1D
The IEEE standard that describes, among other things, bridgin…
802.1q
The IEEE standard that specifies how VLAN and trunking inform…
165 terms
Network + Chapter 6
Host-to-host Layer
Process/Application layer
Host-to-host Layer
Host-to-host Layer
Layer in the DoD model that is the same as the Transport Layer.
Layer in the DoD model that defines protocols for node-to-nod…
Layer in the DoD model that parallels the Transport Layer def…
Layer in DoD model that creates reliable end-to-end communica…
Host-to-host Layer
Layer in the DoD model that is the same as the Transport Layer.
Process/Application layer
Layer in the DoD model that defines protocols for node-to-nod…
33 terms
Network+ Chapter 6
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
14 terms
Chapter 6 - Installing a Physical Network
Horizontal Cabling
Run
Solid Core UTP
Stranded Core
the cabling that goes more or less horizontally from a work a…
A single piece of cable that runs from a work area to a telec…
A better conductor, but stiff and will break if handled too o…
Not quite as good of a conductor as solid core, but will stan…
Horizontal Cabling
the cabling that goes more or less horizontally from a work a…
Run
A single piece of cable that runs from a work area to a telec…
16 terms
Network Chapter 6
Which of the following addresses is a…
You need to manually assign an IPv6 ad…
Which of the following features is bui…
True or False. An IPv6 address with a…
2001:..... fe98. IPv6 addresses are expressed as groups of he…
E. fd00. Unique local addresses are assigned as private addre…
D. IPsec. Internet Security protocol is built into IPv6 and a…
False. The IPv6 prefix of fd is for unique local addresses. L…
Which of the following addresses is a…
2001:..... fe98. IPv6 addresses are expressed as groups of he…
You need to manually assign an IPv6 ad…
E. fd00. Unique local addresses are assigned as private addre…
68 terms
Network+ Chapter 6 Wireless Networking
WLANs (wireless local area networks)
wireless spectrum
True
ITU (International Telecommunication U…
Networks that transmit signals through the air via radio freq…
The ________ is a continuum of the electromagnetic waves used…
The wireless spectrum (as defined by the FCC, which controls…
The ________ is a United Nations agency that sets standards f…
WLANs (wireless local area networks)
Networks that transmit signals through the air via radio freq…
wireless spectrum
The ________ is a continuum of the electromagnetic waves used…
33 terms
Network+ Chapter 6
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
26 terms
Chapter 6 Network+
What is the difference between solid c…
How wide is an equipment rack as a sta…
What is a smaller telecommunications r…
What is the main telecommunication roo…
Solid core is one solid metal wire core. Stranded core is mad…
19 inches
Intermediate Distribution Frame (IDF)
Main Distribution Frame (MDF)
What is the difference between solid c…
Solid core is one solid metal wire core. Stranded core is mad…
How wide is an equipment rack as a sta…
19 inches
19 terms
Networking Chapter 6 - Working With Network Services
Acknowledge
APIPA
authentication header (AH)
Discovery
When the DHCP server sends a final unicast to the client that…
Short for Automatic Private IP Address, this is a private ran…
An IPSec component that provides connectionless integrity and…
A step in DORA when a client computer broadcasts out to the n…
Acknowledge
When the DHCP server sends a final unicast to the client that…
APIPA
Short for Automatic Private IP Address, this is a private ran…
10 terms
Chapter 6 - Installing a Physical Network Acronyms
IDF
NIU
MDF
U
Intermediate distribution frame
Network interface unit
Main Distribution Frame
A rack mount equipment height measurement known simply as a u…
IDF
Intermediate distribution frame
NIU
Network interface unit
40 terms
Network+ Guide to Networks - Chapter 6
False
True
False
True
T/F: IBM began developing the FireWire standard in the 1980s.
T/F: CompactFlash NICs are most frequently used to connect de…
T/F: It is best to perform connectivity tests on a computer c…
T/F: Bridges are protocol independent.
False
T/F: IBM began developing the FireWire standard in the 1980s.
True
T/F: CompactFlash NICs are most frequently used to connect de…
32 terms
Network+ Chapter 6 Study Guide
False
True
False
True
(T/F) IBM began developing the FireWire standard in the 1980s.
(T/F) CompactFlash NICs are most frequently used to connect d…
(T/F) It is best to perform connectivity tests on a computer…
(T/F)Bridges are protocol independent.
False
(T/F) IBM began developing the FireWire standard in the 1980s.
True
(T/F) CompactFlash NICs are most frequently used to connect d…
12 terms
Chapter 6: Network Layer
Routing
Decapsulation
Media independent
Connectionless
The process by which a router receives an incoming frame, dis…
A process by which an end device, after it receives data over…
The networking layers whose processes are not affected by the…
Term used to describe data transfer without the existence of…
Routing
The process by which a router receives an incoming frame, dis…
Decapsulation
A process by which an end device, after it receives data over…
61 terms
Network+ Chapter 6 Routing IP Packets
ARP
Address Resolution Protocol
Time To Live
TTL
Protocal in which a request is a broadcast asking for the MAC…
ARP
TTL
This field in an IP header is decremented once for each route…
ARP
Protocal in which a request is a broadcast asking for the MAC…
Address Resolution Protocol
ARP
77 terms
Chapter 6 - Networking
Host
Peripheral
LAN
WLAN
any device that sends or receives information
any device connected to a host
group of computers under one administrative control
group of wireless devices that connect to access points
Host
any device that sends or receives information
Peripheral
any device connected to a host
19 terms
CHAPTER 6 NETWORKS Networking
LAN
WAN
Topology
Bus
A collection of computers and peripheral devices connected to…
A collection of computers and LANs connected together over a…
A description of how devices are connected together. Does not…
A topology where each device is connected to a main cable, re…
LAN
A collection of computers and peripheral devices connected to…
WAN
A collection of computers and LANs connected together over a…
30 terms
Network Security - Chapter 6 - Network Security
Which of the following is true about s…
A virtual LAN (VLAN) allows devices to…
Which of the following devices is easi…
Which of the following is not an attac…
It is also called subnet addressing
logically
hub
ARP address impersonation
Which of the following is true about s…
It is also called subnet addressing
A virtual LAN (VLAN) allows devices to…
logically
71 terms
network+ chapter 6
wireless spectrum
radiation pattern
unidirectional antenna
omnidirectional antenna
continuum of the electronagnetic waves used for data and voic…
relative strength over a three dimensional area of all the el…
issues wireless signals along a single direction
issues and receives wireless signals with equal strength in a…
wireless spectrum
continuum of the electronagnetic waves used for data and voic…
radiation pattern
relative strength over a three dimensional area of all the el…
22 terms
Network+ Chapter 6 Quiz
Which utility can be used to display a…
Which are not valid message types for…
How long will a dynamic ARP entry rema…
ARP is responsible for converting ____…
ARP is responsible for converting a layer-3 address (IP addre…
ARP decline and ARP response are not valid ARP messages. Only…
Two minutes
IP Addresses to Mac Addresses
Which utility can be used to display a…
ARP is responsible for converting a layer-3 address (IP addre…
Which are not valid message types for…
ARP decline and ARP response are not valid ARP messages. Only…
46 terms
Chapter 6 - Network Security
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
40 terms
Chapter 6 Network Security
A basic level of security can be achie…
The OSI model breaks networking steps…
Behavior-based monitoring attempts to…
Security is enhanced by subnetting a s…
True
False
True
True
A basic level of security can be achie…
True
The OSI model breaks networking steps…
False
98 terms
Network Chapter 6
2.4-GHz band
5-GHz band
802.11a
802.11ac
The range of radio frequencies from 2.4 to 2.4835 GHz, which…
A range of frequencies that comprises four frequency bands: 5…
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique that ex…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz, which…
5-GHz band
A range of frequencies that comprises four frequency bands: 5…
13 terms
Chapter 6 - Network
Bridges
Switching
Store-and-forward
Cut through
Devices that connect two network segments by analyzing MAC ad…
Connectivity devices that subdivide a network into smaller lo…
A switch reads the entire data frame into its memory and chec…
A switch that reads a frame's header and decides where to for…
Bridges
Devices that connect two network segments by analyzing MAC ad…
Switching
Connectivity devices that subdivide a network into smaller lo…
24 terms
Chapter 6 social network
group
primary group
primary relationship
secondary relationship
at least 2 people who have one or more goals in common and sh…
people who are emotionally close, know one another well and s…
interactions that are intimate, personal, caring, and fulfill…
impersonal interactions involving limited parts of personalit…
group
at least 2 people who have one or more goals in common and sh…
primary group
people who are emotionally close, know one another well and s…
10 terms
Network Operating Systems and Network Communications - Chapter 6
Which of the following is the UNC form…
Which protocol is designed to match IP…
How can you reduce netwrok collisions?
Which protocol serves the same purpose…
\\Server1\MyFiles
ARP
Segment the network using switches
LLMNR
Which of the following is the UNC form…
\\Server1\MyFiles
Which protocol is designed to match IP…
ARP
32 terms
CIS 250: Chapter 6 Network Layer
Routing
connectionless
Best effort
Media independent
Provides services to direct packets to a destination host on…
No connection with the destination is established before send…
Packet delivery is not guaranteed
Operation is independent of the medium carrying data
Routing
Provides services to direct packets to a destination host on…
connectionless
No connection with the destination is established before send…
Network Layer: Chapter 6
What are two functions that are provid…
Which key combination allows a user to…
Within a production network, what is t…
Which value, that is contained in an I…
providing end devices with a unique network identifier ... dire…
ctrl+c
The default gateway address is used to forward packets origin…
Time-to-live
What are two functions that are provid…
providing end devices with a unique network identifier ... dire…
Which key combination allows a user to…
ctrl+c
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
35 terms
Network+ Guide to Networks - Chapter 6
data transreceiver
PCI
lanes
external
Nearly all NICs contain a(n) ____, the device that transmits…
By far, the most popular expansion board NIC is one that uses…
PCIe slots vary depending on the number of ____ they support.
CompactFlash is an example of a peripheral device attached to…
data transreceiver
Nearly all NICs contain a(n) ____, the device that transmits…
PCI
By far, the most popular expansion board NIC is one that uses…
25 terms
Network+ - Chapter 6 - Review
If you purchase a new desktop computer…
If you purchase a new laptop today, wh…
Which two of the following IRQs could…
A certain computer on your Fast Ethern…
PCI
On-board
9 11
By modifying the NIC properties through the operating system
If you purchase a new desktop computer…
PCI
If you purchase a new laptop today, wh…
On-board
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
40 terms
Network+ Guide to Networks - Chapter 6
False
True
False
True
T/F: IBM began developing the FireWire standard in the 1980s.
T/F: CompactFlash NICs are most frequently used to connect de…
T/F: It is best to perform connectivity tests on a computer c…
T/F: Bridges are protocol independent.
False
T/F: IBM began developing the FireWire standard in the 1980s.
True
T/F: CompactFlash NICs are most frequently used to connect de…
30 terms
Network Security - Chapter 6 - Network Security
Which of the following is true about s…
A virtual LAN (VLAN) allows devices to…
Which of the following devices is easi…
Which of the following is not an attac…
It is also called subnet addressing
logically
hub
ARP address impersonation
Which of the following is true about s…
It is also called subnet addressing
A virtual LAN (VLAN) allows devices to…
logically
20 terms
Network+ Chapter 6 Review
Which of the following utilities could…
Which of the following is a significan…
You and a friend decide to set up Fast…
You are a network technician working o…
ethtool
The SFP can be added or removed without affecting operations,…
Filter traffic based on IP address.
None of its LEDs are lit.
Which of the following utilities could…
ethtool
Which of the following is a significan…
The SFP can be added or removed without affecting operations,…
25 terms
Chapter 6: Installing an Physical Network
All the cabling from individual work a…
The central location that all cabling…
A single piece of installed horizontal…
The set of standards established by th…
Horizonal cabling
Telecommunications room
Run
606
All the cabling from individual work a…
Horizonal cabling
The central location that all cabling…
Telecommunications room
25 terms
Chapter 6: Network Communications and Protocols
What are two main reasons why data mus…
When the network operating system at t…
What are the 3 basic parts of a Packet…
What is Packet Creation?
1) large amounts of data sent as one large unit ties up the n…
1) Send the original, disassembled data in small chunks.... 2)…
1) Header: usually contains the source and destination addres…
packet creation process begins at the Application layer of th…
What are two main reasons why data mus…
1) large amounts of data sent as one large unit ties up the n…
When the network operating system at t…
1) Send the original, disassembled data in small chunks.... 2)…
24 terms
Cisco - Chapter 6 - Network Layer
IP Header
Payload
Differentiated Services (DS)
Time-to-live (TTL)
IP Header - Identifies the packet characteristics. The image…
Payload - Contains the Layer 4 segment information and the ac…
Differentiated Services (DS) - is an 8-bit field used to dete…
Time-to-Live (TTL) - Is a field that Contains an 8-bit binary…
IP Header
IP Header - Identifies the packet characteristics. The image…
Payload
Payload - Contains the Layer 4 segment information and the ac…
33 terms
Network+ Guide to Networks Chapter 6 - RQ
Layer 3
Wi-Fi
Class 1
Bluesnarfing
What is the lowest layer of the OSI model at which wired and…
Which one of the following wireless transmission types doe NO…
Which Bluetooth class has the highest power output?
A hacker takes advantage of a Bluetooth connection to send a…
Layer 3
What is the lowest layer of the OSI model at which wired and…
Wi-Fi
Which one of the following wireless transmission types doe NO…
19 terms
Networking Chapter 6
Acknowledge
APIPA
authentication header (AH)
Discovery
When the DHCP server sends a final unicast to the client that…
Short for Automatic Private IP Address, this is a private ran…
An IPSec component that provides connectionless integrity and…
A step in DORA when a client computer broadcasts out to the n…
Acknowledge
When the DHCP server sends a final unicast to the client that…
APIPA
Short for Automatic Private IP Address, this is a private ran…
86 terms
Network+ Guide to Networks - Sixth Edition - Chapter 6 Key Terms
802.1D
802.1q
802.1w
access port
The IEEE standard that describes, among other things, bridgin…
The IEEE standard that specifies how VLAN and trunking inform…
The IEEE standard that describes RSTP (Rapid Spanning Tree Pr…
The interface on a switch used for an end node. Devices conne…
802.1D
The IEEE standard that describes, among other things, bridgin…
802.1q
The IEEE standard that specifies how VLAN and trunking inform…
19 terms
CHAPTER 6 NETWORKS Networking
LAN
WAN
Topology
Bus
A collection of computers and peripheral devices connected to…
A collection of computers and LANs connected together over a…
A description of how devices are connected together. Does not…
A topology where each device is connected to a main cable, re…
LAN
A collection of computers and peripheral devices connected to…
WAN
A collection of computers and LANs connected together over a…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
40 terms
Chapter 6 Network Security
A basic level of security can be achie…
The OSI model breaks networking steps…
Behavior-based monitoring attempts to…
Security is enhanced by subnetting a s…
True
False
True
True
A basic level of security can be achie…
True
The OSI model breaks networking steps…
False
15 terms
Chapter 6 Network Security
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Heuristic Monitoring
Compares baseline and raises alert if anything is not consist…
Compares normal processes and actions
Separate network that rests outside the secure network
Uses an algorithm to determine if a treat exists
Anomaly-Based Monitoring
Compares baseline and raises alert if anything is not consist…
Behavior-Based Monitoring
Compares normal processes and actions
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
46 terms
Network Security - Chapter 6
All-In-One Network Security Appliance
Anomaly-Based Monitoring
Behavior-Based Monitoring
Demilitarized Zone (DMZ)
Network hardware that provides multiple security functions.
A monitoring technique used by an IDS that creates a baseline…
A monitoring technique used by an IDS that uses the normal pr…
A separate network that rests outside the secure network peri…
All-In-One Network Security Appliance
Network hardware that provides multiple security functions.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that creates a baseline…
1 of 10