How can we help?

You can also find more resources in our Help Center.

Study sets matching "networking chapter 8"

Study sets
Classes
Users

Study sets matching "networking chapter 8"

11 terms
Networking FOL Chapter 8
On which devices would you statically…
Identify layer 3 multicast addresses.…
What do routers do with broadcast traf…
In your first lab you set a static IP…
Router... ... Printer... ... Email Server... ... Switch
224.10.10.5
They drop the packet
255.255.0.0
On which devices would you statically…
Router... ... Printer... ... Email Server... ... Switch
Identify layer 3 multicast addresses.…
224.10.10.5
25 terms
Networking Chapter 8 Quiz
Router
Border Gateway Protocol (BGP-4)
Dynamic routing
Static route
A device called a _____________ is also called a Layer 3 swit…
The external routing protocol used on the Internet is _______…
The variety of __________ methods would include RIP, OSPF, BG…
A __________ is normally entered manually into a router.
Router
A device called a _____________ is also called a Layer 3 swit…
Border Gateway Protocol (BGP-4)
The external routing protocol used on the Internet is _______…
10 terms
Networking Chapter 8
A _____________ switch is expandable.…
You are looking at a drawing of a 100…
True or false. Layer 2 switches create…
Your network includes computers connec…
modular switch You can expand a modular switch by adding modu…
B Ports on a 100 Mbps switch are labeled with F or Fa to indi…
False A layer 2 switch creates separate collision domains, no…
C Switches create a separate collision domain for every devic…
A _____________ switch is expandable.…
modular switch You can expand a modular switch by adding modu…
You are looking at a drawing of a 100…
B Ports on a 100 Mbps switch are labeled with F or Fa to indi…
Networking Chapter 8
It determines the path used based on t…
MAC address/switch port number
cut-through
fragment-free
Which of the following is not a true statement regarding the…
Which of the following combinations will you find in a switch…
Which of the following is the fastest switching mode?... -cut-th…
Which switching method reads a minimum of 64 bytes of an Ethe…
It determines the path used based on t…
Which of the following is not a true statement regarding the…
MAC address/switch port number
Which of the following combinations will you find in a switch…
22 terms
CCNA Introduction to Networks Chapter 8
B. tunneling
A. 251
B. the average time it takes a packet…
A. loopback... B. link-local
Which network migration technique encapsulates IPv6 packets i…
A DHCP server is used to assign IP addresses dynamically to t…
Which two things can be determined by using the ping command?…
What are two types of IPv6 unicast addresses? (Choose two.)... A…
B. tunneling
Which network migration technique encapsulates IPv6 packets i…
A. 251
A DHCP server is used to assign IP addresses dynamically to t…
91 terms
Ch 8 Wireless Networking
WLAN
Wireless Spectrum
Radiation Pattern
Directional Antenna
Networks that transmit signals through the atmosphere via rad…
A continuum of the electromagnetic waves used for data and vo…
An antenna's _______ _______ describes the relative strength…
A ______ ______ issues wireless signals along a single direct…
WLAN
Networks that transmit signals through the atmosphere via rad…
Wireless Spectrum
A continuum of the electromagnetic waves used for data and vo…
7 terms
Networking Chapter 8
WAP
Omnidirectional Antenna
Unidirectional Antenna
CSMA/CA
Wireless Access Point. Interconnects a LAN and a WLAN
Issues and receives wireless signals. Equal strength in all d…
ONLY issues signals in one direction.
Nodes attempt to avoid collisions by transmitting only when a…
WAP
Wireless Access Point. Interconnects a LAN and a WLAN
Omnidirectional Antenna
Issues and receives wireless signals. Equal strength in all d…
27 terms
Chapter 8 - Networking
Deprecated Naming Scheme
Current interface naming scheme
View current network settings
Set link of en555 to up
eth0, eth1, eth2
wl:wlan, ww:wwan, en:ethernet; o:onboard, s:hotplug, p:pci; i…
ip addr show
ip link set dev en555 up
Deprecated Naming Scheme
eth0, eth1, eth2
Current interface naming scheme
wl:wlan, ww:wwan, en:ethernet; o:onboard, s:hotplug, p:pci; i…
12 terms
Chapter 8 networking
NAT
Users
169
BootP
allows 65 thousand private IP's to 1 public IP address
The static IP address is assigned by?
APIPA address starts with what number in its first octet?
broadcast to DHCP which assigns IP, Gateway, Subnet
NAT
allows 65 thousand private IP's to 1 public IP address
Users
The static IP address is assigned by?
25 terms
Networking Chapter 8 Network Infrastructures and Security
3-leg perimeter configuration
application-level gateway (ALG)
back-to-back configuration
caching proxy
A configuration whereby the DMZ is usually attached to a sepa…
A firewall technology that supports address and port translat…
A configuration that has a DMZ situated between two firewall…
A server or device that tries to serve client requests withou…
3-leg perimeter configuration
A configuration whereby the DMZ is usually attached to a sepa…
application-level gateway (ALG)
A firewall technology that supports address and port translat…
80 terms
Networking Chapter 8 Study Guide
Problems with a device can sometimes b…
Devices and their device drivers are m…
____ systems and peripherals have the…
To protect the data on a USB storage d…
B
C
A
D
Problems with a device can sometimes b…
B
Devices and their device drivers are m…
C
25 terms
Chapter 8: Networking
Your computer is configured to obtain…
Which location type would be most appr…
Provides you with a way to control how…
Utility that will display the IPv4 rou…
ipconfig... netsh
Public network
Network Discovery
route... netstat... nslookup
Your computer is configured to obtain…
ipconfig... netsh
Which location type would be most appr…
Public network
15 terms
Networking chapter 8
A firewall typically involves a combin…
A SOHO wireless router typically acts…
A proxy that provides Internet clients…
​What characteristic of viruses make i…
True
True
Reverse Proxy
Polymorphism
A firewall typically involves a combin…
True
A SOHO wireless router typically acts…
True
Networking - Chapter 8
Which two statements describe broadcas…
A user is unable to access the company…
The 8-bit binary value for 41 is
The last host address on the 10.15.25.…
Directed broadcasts are intended for all hosts on a local or…
link-local... Refer to curriculum topic: 8.1.4 IPv4 addresses i…
00101001... 32 + 8 + 1 = 41
10.15.25.254 ... or... 10.15.25.254/24
Which two statements describe broadcas…
Directed broadcasts are intended for all hosts on a local or…
A user is unable to access the company…
link-local... Refer to curriculum topic: 8.1.4 IPv4 addresses i…
25 terms
Chapter 8: Networking
Your computer is configured to obtain…
Which location type would be most appr…
Provides you with a way to control how…
Utility that will display the IPv4 rou…
ipconfig... netsh
Public network
Network Discovery
route... netstat... nslookup
Your computer is configured to obtain…
ipconfig... netsh
Which location type would be most appr…
Public network
35 terms
Networking Chapter 8
Which of the following is not true abo…
Which of the following is not a type o…
Switches: ... a. learn addresses by readi…
Routers: ... a. operate at the applicatio…
They tend to use lower speed circuits than LANs.
dumb terminals
learn addresses by reading the source and destination addresses
may also be called TCP/IP gateways
Which of the following is not true abo…
They tend to use lower speed circuits than LANs.
Which of the following is not a type o…
dumb terminals
29 terms
Chapter 8 Intro to Networking
What are the parts of an IPv4 address?…
What is the purpose of the network add…
What are characteristics in common amo…
Which of the following IPv4 addresses…
host, network
to refer to a network
the source address is always a unicast address, there are nev…
10.10.10.1, 192.168.1.1
What are the parts of an IPv4 address?…
host, network
What is the purpose of the network add…
to refer to a network
15 terms
Chapter 8 - Networking Vocabulary
3 advantages of auto summarization
1 disadvantage of auto summarization
Command to verify auto summarization
Supernet
-Reduces the number of routing updates and entries... -Reduces b…
not useful in situations when traffic is attempting to reach…
show ip protocols
a larger network consisting of multiple smaller subnets
3 advantages of auto summarization
-Reduces the number of routing updates and entries... -Reduces b…
1 disadvantage of auto summarization
not useful in situations when traffic is attempting to reach…
10 terms
Chapter 8- Networking and Digital Comm.
bandwidth
cable modem
dial up connection
DSL (digital subscriber line)
the number of stuff that can be sent through a communication…
uses the same network has coaxial cables that deliver TV sign…
a connection to the internet using a standard telephone line
technology that provides high-speed internet connections usin…
bandwidth
the number of stuff that can be sent through a communication…
cable modem
uses the same network has coaxial cables that deliver TV sign…
76 terms
Chapter 8 Networking (key terms)
802.1x
802.11
802.3
Address Prefix
A IFEE standard designed to enhance security of wireless netw…
A group of IFEE standards that define how to transfer Etherne…
A group of IFEE standards that define the transfer of data ov…
The first portion of an IP address that allows the identifica…
802.1x
A IFEE standard designed to enhance security of wireless netw…
802.11
A group of IFEE standards that define how to transfer Etherne…
ITGS Chapter 8: Networking
geostationary communications satellites
telecommunication technology
computer network (not in blue but stil…
local area network (LAN)
- satellites that match the Earth's rotations... - hang in a sta…
technology of long-distance communication
any system of 2 or more computers that are linked together
a network in which the computers are physically close to each…
geostationary communications satellites
- satellites that match the Earth's rotations... - hang in a sta…
telecommunication technology
technology of long-distance communication
59 terms
Chapter 8 Networking Keyterms
LEC
IXC
FCC
CRTC
local exchange carrier, a common carrier that provides local…
Interexchange carrier, someone who provides long-distance ser…
Federal Communications Commission, U.S. agency that regulates…
Canadian Radio-Television and Telecommunications Commission,…
LEC
local exchange carrier, a common carrier that provides local…
IXC
Interexchange carrier, someone who provides long-distance ser…
35 terms
Networking & Communication Chapter 8
Geographic classifications... Two Major C…
LAN
WAN
Components Role Classification... Two typ…
Local area network (LAN)... Wide Area Network (WAN)
Least expensive to install... Must faster than the WAN
A wide area network spans a large area, city, state, nation
Peer to Peer... Server or client based
Geographic classifications... Two Major C…
Local area network (LAN)... Wide Area Network (WAN)
LAN
Least expensive to install... Must faster than the WAN
49 terms
Chapter 8 Wireless Networking
Two Antennas
Directional Antenna
WLAN
Wireless Spectrum
________ must be tuned to same frequency to exchange informat…
A _______ issues wireless signals along a single direction.
Networks that transmit signals through the air via radio freq…
_______ a continuum of the electromagnetic waves used for dat…
Two Antennas
________ must be tuned to same frequency to exchange informat…
Directional Antenna
A _______ issues wireless signals along a single direction.
32 terms
Testout Networking Chapter 8
You want to maintain security on your…
Using the Netstat command, you notice…
You want to allow your users to downlo…
After blocking a number of ports to se…
53
Downloading a file
FTP
Open port 25 to allow SMTP service
You want to maintain security on your…
53
Using the Netstat command, you notice…
Downloading a file
102 terms
Chapter 8 - Communications and Networks
802.11
802.16
ATM
Bluetooth
Series of network standards developed by IEEE that specifies…
Worldwide Interoperability for Microwave Access. Newer networ…
Asynchronous Transfer Mode; service that carries voice, data,…
Network standard, specifically a protocol, that defines how t…
802.11
Series of network standards developed by IEEE that specifies…
802.16
Worldwide Interoperability for Microwave Access. Newer networ…
70 terms
Networking 100 Chapter 8
What does a router do to packets?
What layer does a router operate on in…
What layer does the router operate on…
How many connections must a router have?
Forwards packets based on their destination IP address.... Conne…
Network layer
Internet layer
At least two connections.
What does a router do to packets?
Forwards packets based on their destination IP address.... Conne…
What layer does a router operate on in…
Network layer
18 terms
Chapter 8 networking computers with switches
form factor switch
modular switch
first 10 Mbs port
first 100 Mbs port
set number of ports; max at 48
starts with few ports and then can be added as you go along
E0
F0
form factor switch
set number of ports; max at 48
modular switch
starts with few ports and then can be added as you go along
30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
19 terms
CHAPTER 8 NETWORKING TEST
ipconfig... netsh
Public network
netstat ... route... netsh
SMB
Your computer is configured to obtain an IPv4 address and DNS…
Which location type would be most appropriate to select when…
Your computer is configured to obtain an IPv4 address and DNS…
Which protocol is used by the Client for Microsoft Networks a…
ipconfig... netsh
Your computer is configured to obtain an IPv4 address and DNS…
Public network
Which location type would be most appropriate to select when…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
14 terms
Computer Networking - Chapter 8 - Security in Computer Networks
Security Requirements
Integrity
Availability
Confidentiality and Privacy
Integrity, Availability, Confidentiality and Privacy, Authent…
Is what was received the same thing as what was sent?
Legal users should be able to use. Maintain hardware, update…
No snooping or wiretapping
Security Requirements
Integrity, Availability, Confidentiality and Privacy, Authent…
Integrity
Is what was received the same thing as what was sent?
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
156 terms
Network+ Chapter 8 Wireless LANs
Ad Hoc
Hotspot
Association
Basic WLAN Topology with a Wireless Ro…
A WLAN in which a device with a built-in wireless card connec…
An AP that provides WiFi as a service.
The process through which a wireless client attaches with a w…
Ad Hoc
A WLAN in which a device with a built-in wireless card connec…
Hotspot
An AP that provides WiFi as a service.
94 terms
Network+ Chapter 8
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
30 terms
Network+ Chapter 8 Network Risk Management
Your organization has just approved a…
What wireless attack might a potential…
What kind of vulnerability is exploite…
Which type of DoS attack orchestrates…
D. Posture assessment
A. Jamming
B. Buffer overflow
C. DRDoS (distributed reflector DoS) attack
Your organization has just approved a…
D. Posture assessment
What wireless attack might a potential…
A. Jamming
14 terms
Introduction to Networking Chapter 8
What are two benefits of subnetting ne…
A college has five campuses. Each camp…
Fill in the blank.... The last host addre…
Three methods allow IPv6 and IPv4 to c…
grouping devices to improve management and security 2. Reduci…
1.geographic location device type
.254
The IPv4 packets and IPv6 packets coexist in the same network…
What are two benefits of subnetting ne…
grouping devices to improve management and security 2. Reduci…
A college has five campuses. Each camp…
1.geographic location device type
24 terms
Chapter 8 - Configuring Basic Networking
ifconfig
Broadcast Query
nslookup
host
This is the basic networking command for Linux. ... ___________…
A message that goes out to all the computers on a local netwo…
This program performs DNS lookups and returns the results. It…
This program serves as a replacement for the simpler uses of…
ifconfig
This is the basic networking command for Linux. ... ___________…
Broadcast Query
A message that goes out to all the computers on a local netwo…
76 terms
Network Chapter 8
WAN- Wide Access Network
GAN- Golbal Area Network
WAN Devices
Modem
A netowrk that spans a large area, often across myltiple geog…
...
An able you to connect LANs together.
Enable digital data to be sent over an analog medium cinch as…
WAN- Wide Access Network
A netowrk that spans a large area, often across myltiple geog…
GAN- Golbal Area Network
...
13 terms
Chapter 8 Networking and Communication Basics
Network
Devices that is found on a network
Network can be classified into 2 major…
Other classifications of a network, bu…
Two or more objects sharing resources and information... -comput…
Printers, scanners, & barcode readers
Local Area Network (LAN): close by... Wide Area Network (WAN): e…
Metropolitan Area Network (MAN)... Tiny Area Network (TAN)... Contr…
Network
Two or more objects sharing resources and information... -comput…
Devices that is found on a network
Printers, scanners, & barcode readers
102 terms
Chapter 8: Networking and Digital Communication
Geostationary Communications Satellites
Telecommunication
Local Area Network (LAN)
Node
Satellites that match the Earth's rotation so they can hang i…
Long-distance electronic communication in a variety of forms.
Multiple personal computers connected on a network.
Each computer and shared peripheral on a local network.
Geostationary Communications Satellites
Satellites that match the Earth's rotation so they can hang i…
Telecommunication
Long-distance electronic communication in a variety of forms.
78 terms
Network+ Chapter 8 Network Risk Managament
posture assessment
security audit
hacker
hacker
Every organization should assess its security risks by conduc…
A qualified consulting company can also assess the security o…
A __________, in the original sense of the word, is someone w…
Today, a __________ is used more generally to describe indivi…
posture assessment
Every organization should assess its security risks by conduc…
security audit
A qualified consulting company can also assess the security o…
12 terms
Chapter 8: Networking - Videos & Resources
Power Point - Chapter 8: Networking
Internet Protocol - IPv4 vs IPv6 as Fa…
Microsoft 70-680: 4.1 - An Overview of…
Microsoft 70-680: 4.2 - Configuring IPv4
infosys.richmond.cc.nc.us/XP/9781111309770_PPT_ch08.ppt
https://www.youtube.com/watch?v=aor29pGhlFE
http://www.professormesser.com/microsoft-70-680/an-overview-o…
http://www.professormesser.com/microsoft-70-680/configuring-i…
Power Point - Chapter 8: Networking
infosys.richmond.cc.nc.us/XP/9781111309770_PPT_ch08.ppt
Internet Protocol - IPv4 vs IPv6 as Fa…
https://www.youtube.com/watch?v=aor29pGhlFE
30 terms
Network+ Guide to Networks Chapter 8 - RQ
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
47 terms
Chapter 8: Trade Networks
What civilization largely contributed…
What Chinese general made a trip and b…
What western products did the Chinese…
Zhang Jian, through the Silk Road, bro…
The Parthians; because of location along the route
Zhang Jian
Horses
Alfalfa and wine grapes
What civilization largely contributed…
The Parthians; because of location along the route
What Chinese general made a trip and b…
Zhang Jian
103 terms
Network + Chapter 8
Subnetting
Subnetting
Subnetworks
2^1
When you take one larger network and break it into a bunch of…
Advantages: reduced network traffic, optimized network perfor…
What you create when you take bits from host portion of the I…
2
Subnetting
When you take one larger network and break it into a bunch of…
Subnetting
Advantages: reduced network traffic, optimized network perfor…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
68 terms
Networking Exam 3 Chapter 8
Interfaces
Routing
Hierarchical
Network part
The router's equivalent of a network interface card; a port o…
The forwarding of IP packets
IP addresses are hierarchical, they usually consist of three…
It identifies the host's network on the Internet
Interfaces
The router's equivalent of a network interface card; a port o…
Routing
The forwarding of IP packets
1 of 10