How can we help?

You can also find more resources in our Help Center.

Study sets matching "network chapter 8"

Study sets
Classes
Users

Study sets matching "network chapter 8"

30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
94 terms
Network+ Chapter 8
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
76 terms
Network Chapter 8
WAN- Wide Access Network
GAN- Golbal Area Network
WAN Devices
Modem
A netowrk that spans a large area, often across myltiple geog…
...
An able you to connect LANs together.
Enable digital data to be sent over an analog medium cinch as…
WAN- Wide Access Network
A netowrk that spans a large area, often across myltiple geog…
GAN- Golbal Area Network
...
30 terms
Network+ Chapter 8 Network Risk Management
Your organization has just approved a…
What wireless attack might a potential…
What kind of vulnerability is exploite…
Which type of DoS attack orchestrates…
D. Posture assessment
A. Jamming
B. Buffer overflow
C. DRDoS (distributed reflector DoS) attack
Your organization has just approved a…
D. Posture assessment
What wireless attack might a potential…
A. Jamming
103 terms
Network + Chapter 8
Subnetting
Subnetting
Subnetworks
2^1
When you take one larger network and break it into a bunch of…
Advantages: reduced network traffic, optimized network perfor…
What you create when you take bits from host portion of the I…
2
Subnetting
When you take one larger network and break it into a bunch of…
Subnetting
Advantages: reduced network traffic, optimized network perfor…
30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
32 terms
Chapter 8 Network+
The concept of masking all of the priv…
What is an ISR?
What happens to the layer 2 frame on a…
Routers use ____ to determine where to…
Network Address Translation or NATWhat is an ISR?
An integrated services router offers more than just routing.…
The layer 2 frame is stripped away and the IP packet is dropp…
Routing tables
The concept of masking all of the priv…
Network Address Translation or NATWhat is an ISR?
What is an ISR?
An integrated services router offers more than just routing.…
22 terms
CCNA Introduction to Networks Chapter 8
B. tunneling
A. 251
B. the average time it takes a packet…
A. loopback... B. link-local
Which network migration technique encapsulates IPv6 packets i…
A DHCP server is used to assign IP addresses dynamically to t…
Which two things can be determined by using the ping command?…
What are two types of IPv6 unicast addresses? (Choose two.)... A…
B. tunneling
Which network migration technique encapsulates IPv6 packets i…
A. 251
A DHCP server is used to assign IP addresses dynamically to t…
156 terms
Network+ Chapter 8 Wireless LANs
Ad Hoc
Hotspot
Association
Basic WLAN Topology with a Wireless Ro…
A WLAN in which a device with a built-in wireless card connec…
An AP that provides WiFi as a service.
The process through which a wireless client attaches with a w…
Ad Hoc
A WLAN in which a device with a built-in wireless card connec…
Hotspot
An AP that provides WiFi as a service.
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
30 terms
Network+ Chapter 8 - QFT
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
34 terms
Network+ Chapter 8 continued
What TCP/IP command can be used to tro…
What is the Linux, Macintosh and UNIX…
Tracert is used on which operating sys…
traceroute is used on which operating…
nslookup
ifconfig
windows
mac, linux and unix
What TCP/IP command can be used to tro…
nslookup
What is the Linux, Macintosh and UNIX…
ifconfig
25 terms
Networking Chapter 8 Network Infrastructures and Security
3-leg perimeter configuration
application-level gateway (ALG)
back-to-back configuration
caching proxy
A configuration whereby the DMZ is usually attached to a sepa…
A firewall technology that supports address and port translat…
A configuration that has a DMZ situated between two firewall…
A server or device that tries to serve client requests withou…
3-leg perimeter configuration
A configuration whereby the DMZ is usually attached to a sepa…
application-level gateway (ALG)
A firewall technology that supports address and port translat…
113 terms
Network Chapter 8
AUP
access list
ACL
agent
A portion of the security policy that explains to users what…
A list of statements used by a router to permit or deny the f…
A list of statements used by a router to permit or deny the f…
A software routine that collects data about a managed device'…
AUP
A portion of the security policy that explains to users what…
access list
A list of statements used by a router to permit or deny the f…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
Network Essentials [Chapter 8]
Subnetting will ____ traffic, _____ pe…
What is the Class A default subnet mask?
What is the Class B default subnet mas…
What is the Class C default subnet mask?
Reduce, improve, isolate
255.0.0.0
1111 1111.1111 1111.0000 0000.0000 0000
255.255.255.0
Subnetting will ____ traffic, _____ pe…
Reduce, improve, isolate
What is the Class A default subnet mask?
255.0.0.0
30 terms
Network+ Guide to Networks Chapter 8 - RQ
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
37 terms
Network+ Chapter 8 The Wonderful World of Routing
Area ID
AS (Autonomous System)
BDR (Backup Designated Router)
Basic NAT
Address assigned to routers in an OSPF network to prevent flo…
One or more networks that are governed by a single protocol w…
A second router set to take over if the designated router fai…
A simple form of NAT that translates a computer's private or…
Area ID
Address assigned to routers in an OSPF network to prevent flo…
AS (Autonomous System)
One or more networks that are governed by a single protocol w…
47 terms
Chapter 8 Computer Network
DoS
Smurf
Virus
Worm
An attack that impacts system ability by flooding it with tra…
A form of DRDoS attack that fakes the source address in ICMP…
A program that attempts to damage a computer system and repli…
A self replicating program that uses the network to replicate…
DoS
An attack that impacts system ability by flooding it with tra…
Smurf
A form of DRDoS attack that fakes the source address in ICMP…
30 terms
Network+ chapter 8
____ is an 802.11n network feature all…
____ may use either the 2.4-GHz or 5-G…
A unique characteristic of the 802.11…
In ____ wireless systems, the transmit…
Frame aggregation
802.11n
Sequence Control
fixed
____ is an 802.11n network feature all…
Frame aggregation
____ may use either the 2.4-GHz or 5-G…
802.11n
31 terms
network chapter 8
which of the following prevents access…
based in the diagram, which type of pr…
which of the following network service…
What port number is used by SNMP?
content filter
reverse proxy server
SSH
161
which of the following prevents access…
content filter
based in the diagram, which type of pr…
reverse proxy server
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
20 terms
Network Security Chapter 8
What is the best way to secure Telnet?
What is the best way to make sure data…
What is the best way to direct visitor…
____ is a simple method of transferrin…
Do not use Telnet at all.
Use the"secure"flag on all sensitive cookies.
Create a .htaccess file with the following entry: Redirect 30…
FTP
What is the best way to secure Telnet?
Do not use Telnet at all.
What is the best way to make sure data…
Use the"secure"flag on all sensitive cookies.
10 terms
Chapter 8: Network Effects
Network Effects (Metcalfe's Law)
Value of Network effects come from 3 s…
Switching costs
Complementary Benefits
When the value of a product or service increases as its numbe…
1) Exchange... 2) Staying Power... 3) Complementary Benefits
THe cost of a consumer incurs when moving from one product to…
Products or services that add additional value to the primary…
Network Effects (Metcalfe's Law)
When the value of a product or service increases as its numbe…
Value of Network effects come from 3 s…
1) Exchange... 2) Staying Power... 3) Complementary Benefits
134 terms
Chapter 8 | Network Risk Management
MASTER ZOMBIE
LOGIC BOMB
SLAVE ZOMBIE
SIGNATURE SCANNING
An upper-layer host in a botnet.
A malicious program designed to start when certain conditions…
A lower-layer host in a botnet.
The comparison of a file's content with known malware signatu…
MASTER ZOMBIE
An upper-layer host in a botnet.
LOGIC BOMB
A malicious program designed to start when certain conditions…
55 terms
Comptia Network + Chapter 8
802.11a
802.11ac multiple input
802.11b
802.11g
Ratified in 1999, this standard supports speeds as high as 54…
An IEEE wireless networking standard operating in the 5GHz ra…
Ratified in 1999, this standard supports speeds as high as 11…
Ratified in 2003, this standard supports speeds as high as 54…
802.11a
Ratified in 1999, this standard supports speeds as high as 54…
802.11ac multiple input
An IEEE wireless networking standard operating in the 5GHz ra…
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
20 terms
Network Security Chapter 8
Protocol Suite
Berkeley Internet Name System (BIND)
Domain Name System Security Extensions…
DNS Transfer
Several protocols that all function together
Prevents DNS poisoning by making the servers less trusting of…
Prevents DNS poisoning by allowing DNS information to be digi…
When an attacker asks the valid DNS server for a zone transfer
Protocol Suite
Several protocols that all function together
Berkeley Internet Name System (BIND)
Prevents DNS poisoning by making the servers less trusting of…
77 terms
Chapter 8 - Network Risk Management
Data breach
Posture assessment
Security audit
Hacker
An unauthorized access or use of sensitive data
A thorough examination of each aspect of the network to deter…
A security assessment that happens to companies accredited by…
Someone who masters the inner workings of computer hardware a…
Data breach
An unauthorized access or use of sensitive data
Posture assessment
A thorough examination of each aspect of the network to deter…
25 terms
Chapter 8 Network Security
The most common protocol suite used to…
____ is used by devices to communicate…
SNMP agents are protected with a passw…
The ____ is a database, organized as a…
TCP/IP
ICMP
community string
DNS
The most common protocol suite used to…
TCP/IP
____ is used by devices to communicate…
ICMP
Chapter 8 Network + Guide to Networks
802.11a
802.11b
802.11g
802.11n
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique designe…
The IEEE standard for a wireless networking technique that ma…
802.11a
The IEEE standard for a wireless networking technique that us…
802.11b
The IEEE standard for a wireless networking technique that us…
24 terms
Network + - Chapter 8 Wireless LANs
Modulates data over an entire range of…
Allows the participants in a communica…
Uses a relatively slow modulation rate…
802.11 Frequency & Speed
Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency division multiplexing (OFDM)
2.4 GHz 1 Mbps or 2 Mbps
Modulates data over an entire range of…
Direct-sequence spread spectrum (DSSS)
Allows the participants in a communica…
Frequency-hopping spread spectrum (FHSS)
11 terms
Networking FOL Chapter 8
On which devices would you statically…
Identify layer 3 multicast addresses.…
What do routers do with broadcast traf…
In your first lab you set a static IP…
Router... ... Printer... ... Email Server... ... Switch
224.10.10.5
They drop the packet
255.255.0.0
On which devices would you statically…
Router... ... Printer... ... Email Server... ... Switch
Identify layer 3 multicast addresses.…
224.10.10.5
13 terms
Chapter 8: Network Effects
Understanding Network Effects
What is the service that provides ulti…
Congestion Effects
The Network Effect and the 3rd World
- NOT present in all industries, but a powerful force when it…
Telephone.... - The more people who own telephones, the more val…
When increasing numbers of users lower the value of a product…
- Cellular networks... - Technology Leapfrogging... - Positive Ext…
Understanding Network Effects
- NOT present in all industries, but a powerful force when it…
What is the service that provides ulti…
Telephone.... - The more people who own telephones, the more val…
16 terms
Network + Chapter 8 Review Questions
/21
/29
6 host
30
You have a Class B network and need 29 subnets. What is your…
What mask provides 6 hosts per subnet and has a 255.255.255.2…
How many hosts per subnet does a /29 mask provide?
What is the maximum number of IP addresses that can be assign…
/21
You have a Class B network and need 29 subnets. What is your…
/29
What mask provides 6 hosts per subnet and has a 255.255.255.2…
41 terms
Chapter 8 - Wireless Network Security
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
17 terms
Cisco Network Fundamentals Chapter 8
Copper cable and fiber-optic cable are…
What is the purpose of encoding?... a) To…
What two signaling methods use voltage…
What is the purpose of the physical la…
physical media
d) Encoding represents the data bits by using different volta…
NRZ (nonreturn to zero) and Manchester
d) the chief purpose of the physical layer is to define the f…
Copper cable and fiber-optic cable are…
physical media
What is the purpose of encoding?... a) To…
d) Encoding represents the data bits by using different volta…
30 terms
Network Security - Chapter 8 - Wireless Network Security
Bluetooth falls under the category of…
A Bluetooth network that contains one…
___ is the unauthorized access of info…
The IEEE ___ standard specifies a maxi…
personal area network (PAN)
piconet
Bluesnarfing
802.11a
Bluetooth falls under the category of…
personal area network (PAN)
A Bluetooth network that contains one…
piconet
102 terms
Chapter 8 - Communications and Networks
802.11
802.16
ATM
Bluetooth
Series of network standards developed by IEEE that specifies…
Worldwide Interoperability for Microwave Access. Newer networ…
Asynchronous Transfer Mode; service that carries voice, data,…
Network standard, specifically a protocol, that defines how t…
802.11
Series of network standards developed by IEEE that specifies…
802.16
Worldwide Interoperability for Microwave Access. Newer networ…
21 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
40 terms
Security+ Network Security Fundamentals Chapter 8
False
False
True
False
TCP is responsible for addressing packets and sending them on…
TCP/IP uses its own five-layer architecture that includes Net…
IEEE 802.1x is commonly used on wireless networks.
IP telephony and Voice over IP (VoIP) are identical.
False
TCP is responsible for addressing packets and sending them on…
False
TCP/IP uses its own five-layer architecture that includes Net…
30 terms
Network Pro Ch 8
Which of the following prevents access…
You manage a server that runs your com…
Based on the diagram, which type of pr…
Which of the following network service…
Content filter
Proxy server
Reverse Proxy Server
SSH
Which of the following prevents access…
Content filter
You manage a server that runs your com…
Proxy server
30 terms
Network Security - Chapter 8 - Wireless Network Security
Bluetooth falls under the category of…
A Bluetooth network that contains one…
___ is the unauthorized access of info…
The IEEE ___ standard specifies a maxi…
personal area network (PAN)
piconet
Bluesnarfing
802.11a
Bluetooth falls under the category of…
personal area network (PAN)
A Bluetooth network that contains one…
piconet
28 terms
Chapter 8 network essentials
Basics of switch operations.
Auto-negotiate mode
auto-MDEX
Mac Address
1. Switches work at the Data link layer(Layer 2) of the OSI m…
Most inexpensive switches. the switch exchanges information w…
switch port detects the type port device and cable it's conne…
tells the switch where to forward a frame.
Basics of switch operations.
1. Switches work at the Data link layer(Layer 2) of the OSI m…
Auto-negotiate mode
Most inexpensive switches. the switch exchanges information w…
30 terms
Network+ Chapter 8 - Characteristics of Wireless Transmission
frequency
single
diffraction
Interference
In wireless communication, to exchange information, two anten…
A directional antenna issues wireless signals along a(n)
In ____, a wireless signal splits into secondary waves when i…
____ is a significant problem for wireless communications bec…
frequency
In wireless communication, to exchange information, two anten…
single
A directional antenna issues wireless signals along a(n)
94 terms
Network+ Guide to Networks - Sixth Edition - Chapter 8 Key Terms
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
103 terms
Network Basics and Setup & Chapter 8
The concept related to using computer…
A high-frequency transmission cable th…
A short-range radio communication stan…
The speed with which a modem transmits…
Connectivity
Coaxial
Bluetooth
Transfer Rate
The concept related to using computer…
Connectivity
A high-frequency transmission cable th…
Coaxial
160 terms
Chapter 8-Neurons: Cellular and Network Properties
Action potential
Autonomic nervous system
Axon
Axonal transport
AP, spike, nerve impulse, conduction signal
Visceral nervous system
Nerve fiber
Axoplasmic flow
Action potential
AP, spike, nerve impulse, conduction signal
Autonomic nervous system
Visceral nervous system
1 of 10