How can we help?

You can also find more resources in our Help Center.

Study sets matching "networks chapter 8"

Study sets
Classes
Users

Study sets matching "networks chapter 8"

22 terms
CCNA Introduction to Networks Chapter 8
B. tunneling
A. 251
B. the average time it takes a packet…
A. loopback... B. link-local
Which network migration technique encapsulates IPv6 packets i…
A DHCP server is used to assign IP addresses dynamically to t…
Which two things can be determined by using the ping command?…
What are two types of IPv6 unicast addresses? (Choose two.)... A…
B. tunneling
Which network migration technique encapsulates IPv6 packets i…
A. 251
A DHCP server is used to assign IP addresses dynamically to t…
50 terms
Chapter 8 Local Area Networks and Backbone Networks
1) Logical components, like physical c…
2) Physical components are frequently…
3) Logical components are usually ____…
4) ________ is a set of programmed ins…
B) maintained
C) hardware
D) software
A) Software
1) Logical components, like physical c…
B) maintained
2) Physical components are frequently…
C) hardware
102 terms
Chapter 8 - Communications and Networks
802.11
802.16
ATM
Bluetooth
Series of network standards developed by IEEE that specifies…
Worldwide Interoperability for Microwave Access. Newer networ…
Asynchronous Transfer Mode; service that carries voice, data,…
Network standard, specifically a protocol, that defines how t…
802.11
Series of network standards developed by IEEE that specifies…
802.16
Worldwide Interoperability for Microwave Access. Newer networ…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
47 terms
Chapter 8: Trade Networks
What civilization largely contributed…
What Chinese general made a trip and b…
What western products did the Chinese…
Zhang Jian, through the Silk Road, bro…
The Parthians; because of location along the route
Zhang Jian
Horses
Alfalfa and wine grapes
What civilization largely contributed…
The Parthians; because of location along the route
What Chinese general made a trip and b…
Zhang Jian
22 terms
CCNA Introduction to Networks Chapter 8
B. tunneling
A. 251
B. the average time it takes a packet…
A. loopback... B. link-local
Which network migration technique encapsulates IPv6 packets i…
A DHCP server is used to assign IP addresses dynamically to t…
Which two things can be determined by using the ping command?…
What are two types of IPv6 unicast addresses? (Choose two.)... A…
B. tunneling
Which network migration technique encapsulates IPv6 packets i…
A. 251
A DHCP server is used to assign IP addresses dynamically to t…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
22 terms
Scaling Networks Chapter 8 Exam
C. Automatic summarization is disabled…
B. 172.16.0.0/16... D. 192.168.10.0/24
D. A default route is being learned th…
C. It ensures that traffic for multipl…
Refer to the exhibit. Router R3 is receiving multiple routes…
Refer to the exhibit. All networks are active in the same EIG…
Refer to the exhibit. Which statement is supported by the out…
Which three statements are advantages of using automatic summ…
C. Automatic summarization is disabled…
Refer to the exhibit. Router R3 is receiving multiple routes…
B. 172.16.0.0/16... D. 192.168.10.0/24
Refer to the exhibit. All networks are active in the same EIG…
30 terms
Network+ Guide to Networks Chapter 8 - RQ
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
15 terms
Chapter 8: Secrity In Computer Networks
secure communication
plain text / clear text
encryption algorithm
ciphertext
Confidentiality... Message integrity... End-point authentication... Op…
message in its original form
turns message from plaintext to ciphertext
encrypted message
secure communication
Confidentiality... Message integrity... End-point authentication... Op…
plain text / clear text
message in its original form
22 terms
CCNA Introduction to Networks Chapter 8
B. tunneling
A. 251
B. the average time it takes a packet…
A. loopback... B. link-local
Which network migration technique encapsulates IPv6 packets i…
A DHCP server is used to assign IP addresses dynamically to t…
Which two things can be determined by using the ping command?…
What are two types of IPv6 unicast addresses? (Choose two.)... A…
B. tunneling
Which network migration technique encapsulates IPv6 packets i…
A. 251
A DHCP server is used to assign IP addresses dynamically to t…
40 terms
Network+ Guide to Networks - Chapter 8
True
True
False
False
T/F: Wireless signals experience attenuation.
T/F: Spread spectrum is a popular way of making wireless tran…
T/F: Wireless networks are laid out using the same topologies…
T/F: If a station detects the presence of several access poin…
True
T/F: Wireless signals experience attenuation.
True
T/F: Spread spectrum is a popular way of making wireless tran…
Chapter 8 Network + Guide to Networks
802.11a
802.11b
802.11g
802.11n
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique that us…
The IEEE standard for a wireless networking technique designe…
The IEEE standard for a wireless networking technique that ma…
802.11a
The IEEE standard for a wireless networking technique that us…
802.11b
The IEEE standard for a wireless networking technique that us…
Computer Networks: Chapter 8
Which network is the smallest?
What is the best protocol for transfer…
What is the least used topology?
What is the mapping of a physical netw…
LAN
TCP/IP
Ring
Topology
Which network is the smallest?
LAN
What is the best protocol for transfer…
TCP/IP
18 terms
Networks: Chapter 8
encryption
symmetric key
digest
certificate authority
Converts a plain text message to cipher-text, which is unreco…
The encryption and decryption keys are identical and both kep…
Representation of a message after being passed through a hash…
A trusted organization that can check the validity of a certi…
encryption
Converts a plain text message to cipher-text, which is unreco…
symmetric key
The encryption and decryption keys are identical and both kep…
25 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
11 terms
Networking FOL Chapter 8
On which devices would you statically…
Identify layer 3 multicast addresses.…
What do routers do with broadcast traf…
In your first lab you set a static IP…
Router... ... Printer... ... Email Server... ... Switch
224.10.10.5
They drop the packet
255.255.0.0
On which devices would you statically…
Router... ... Printer... ... Email Server... ... Switch
Identify layer 3 multicast addresses.…
224.10.10.5
57 terms
Chapter 8 - Communications and Networks
computer communications
applications that depend on communicat…
four basic elements of communication s…
3 types of physical connections
process of sharing data, programs, and information between tw…
email, IM, internet telephone, electronic commerce
sending and receiving devices, communication channel, connect…
twisted pair, coaxial cable, fiber optic cable
computer communications
process of sharing data, programs, and information between tw…
applications that depend on communicat…
email, IM, internet telephone, electronic commerce
78 terms
Chapter 8 communication networks part 1 CNS
Nervous system
Integration
motor output
Endocrine system
uses electrical messages to process and respond to stimulus.…
when brain and spinal cord interpret signals received from se…
when signals go to effectors (glands and muscles) rapid doesn…
uses chemical messages to produce hormones which travel throu…
Nervous system
uses electrical messages to process and respond to stimulus.…
Integration
when brain and spinal cord interpret signals received from se…
54 terms
Introduction to Networks - Chapter 8
subnetwork
Subnet mask
American Standard Code for Information…
octet
See subnet. A group of IP addresses that have the same value…
Signifies which part of the IP address is network and which p…
An 8-bit code for character representation (7 bits plus parit…
A group of 8 binary bits. It is similar to, but not the same…
subnetwork
See subnet. A group of IP addresses that have the same value…
Subnet mask
Signifies which part of the IP address is network and which p…
42 terms
Chapter 8 Communications and Networks
Computer communication
Text messaging
Picture messaging
Video messaging
Process in which two or more computers or devices transfer da…
Allows users to send and receive short text messages on a pho…
Allows users to send pictures and sound files
Allows users to send short video clips
Computer communication
Process in which two or more computers or devices transfer da…
Text messaging
Allows users to send and receive short text messages on a pho…
19 terms
Networks Final Chapter 8
Encryption
Decryption
Confidentiality
Authentication
Translation of data into a secret code. Must have access to a…
...
Requires that a message be encrypted so that only a sender an…
The process of identifying an individual, usually based on us…
Encryption
Translation of data into a secret code. Must have access to a…
Decryption
...
25 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
25 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
30 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
94 terms
Network+ Guide to Networks - Sixth Edition - Chapter 8 Key Terms
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
39 terms
Managing and Troubleshooting Networks Chapter 8 (4th Edition)
Areas
Area ID
Autonomous System (AS)
Basic NAT
Groups of logically associated OSPF routers designed to maxim…
Address assigned to routers in an OSPF network to prevent flo…
One or more networks that are governed by a single protocol,…
A simple form of NAT that translates a computer's private or…
Areas
Groups of logically associated OSPF routers designed to maxim…
Area ID
Address assigned to routers in an OSPF network to prevent flo…
30 terms
Network+ Chapter 8
Posture assessment
Jamming
Buffer overflow
DRDoS (distributed reflector DoS) attack
Your organization has just approved a special budget for a ne…
What wireless attack might a potential hacker execute with a…
What kind of vulnerability is exploited by a ping of death?
Which type of DoS attack orchestrates an attack using uninfec…
Posture assessment
Your organization has just approved a special budget for a ne…
Jamming
What wireless attack might a potential hacker execute with a…
14 terms
Computer Networking - Chapter 8 - Security in Computer Networks
Security Requirements
Integrity
Availability
Confidentiality and Privacy
Integrity, Availability, Confidentiality and Privacy, Authent…
Is what was received the same thing as what was sent?
Legal users should be able to use. Maintain hardware, update…
No snooping or wiretapping
Security Requirements
Integrity, Availability, Confidentiality and Privacy, Authent…
Integrity
Is what was received the same thing as what was sent?
15 terms
Chapter 8: Teams and Networks
employee engagement
workplace democracy
task role
multiple stakeholder model
...
...
...
...
employee engagement
...
workplace democracy
...
28 terms
Chapter 8 Wide Area Networks
Outline
Wide area networks (WANs)
Focus of the Chapter
Regulation of services... Common Carriers
8.1 - Introduction... 8.2 - Circuit-Switched Networks... 8.3 - Dedi…
Connect BNs and LANs across longer distances, often hundreds…
Examine WAN architectures and technologies from a network man…
Federal Communications Commission (FCC) in the US... Canadian Ra…
Outline
8.1 - Introduction... 8.2 - Circuit-Switched Networks... 8.3 - Dedi…
Wide area networks (WANs)
Connect BNs and LANs across longer distances, often hundreds…
78 terms
Chapter 8 - Communications and Networks
802.11
802.16
ATM
Bluetooth
Series of network standards developed by IEEE that specifies…
Worldwide Interoperability for Microwave Access. Newer networ…
Asynchronous Transfer Mode; service that carries voice, data,…
Network standard, specifically a protocol, that defines how t…
802.11
Series of network standards developed by IEEE that specifies…
802.16
Worldwide Interoperability for Microwave Access. Newer networ…
20 terms
Network+ Guide to Networks - sixth edition (chapter 8 review)
To transmit and receive signals to and…
which of the following is not true abo…
You are setting up a WLAN for an insur…
Which of the following 802.11 transmis…
Omnidirectional... Defined: issues and receives wireless signals…
Multipath signaling uses less energy and results in clearer r…
Infrastructure
A destination node must issue an acknowledgment for every pac…
To transmit and receive signals to and…
Omnidirectional... Defined: issues and receives wireless signals…
which of the following is not true abo…
Multipath signaling uses less energy and results in clearer r…
25 terms
Networking Chapter 8 Network Infrastructures and Security
3-leg perimeter configuration
application-level gateway (ALG)
back-to-back configuration
caching proxy
A configuration whereby the DMZ is usually attached to a sepa…
A firewall technology that supports address and port translat…
A configuration that has a DMZ situated between two firewall…
A server or device that tries to serve client requests withou…
3-leg perimeter configuration
A configuration whereby the DMZ is usually attached to a sepa…
application-level gateway (ALG)
A firewall technology that supports address and port translat…
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
20 terms
Network+ Guide to Networks - sixth edition (chapter 8 review)
To transmit and receive signals to and…
which of the following is not true abo…
You are setting up a WLAN for an insur…
Which of the following 802.11 transmis…
Omnidirectional... Defined: issues and receives wireless signals…
Multipath signaling uses less energy and results in clearer r…
Infrastructure
A destination node must issue an acknowledgment for every pac…
To transmit and receive signals to and…
Omnidirectional... Defined: issues and receives wireless signals…
which of the following is not true abo…
Multipath signaling uses less energy and results in clearer r…
156 terms
Network+ Chapter 8 Wireless LANs
Ad Hoc
Hotspot
Association
Basic WLAN Topology with a Wireless Ro…
A WLAN in which a device with a built-in wireless card connec…
An AP that provides WiFi as a service.
The process through which a wireless client attaches with a w…
Ad Hoc
A WLAN in which a device with a built-in wireless card connec…
Hotspot
An AP that provides WiFi as a service.
22 terms
Scaling Networks Chapter 8 Exam
C. Automatic summarization is disabled…
B. 172.16.0.0/16... D. 192.168.10.0/24
D. A default route is being learned th…
C. It ensures that traffic for multipl…
Refer to the exhibit. Router R3 is receiving multiple routes…
Refer to the exhibit. All networks are active in the same EIG…
Refer to the exhibit. Which statement is supported by the out…
Which three statements are advantages of using automatic summ…
C. Automatic summarization is disabled…
Refer to the exhibit. Router R3 is receiving multiple routes…
B. 172.16.0.0/16... D. 192.168.10.0/24
Refer to the exhibit. All networks are active in the same EIG…
22 terms
Scaling Networks Chapter 8 Exam
C. Automatic summarization is disabled…
B. 172.16.0.0/16... D. 192.168.10.0/24
D. A default route is being learned th…
C. It ensures that traffic for multipl…
Refer to the exhibit. Router R3 is receiving multiple routes…
Refer to the exhibit. All networks are active in the same EIG…
Refer to the exhibit. Which statement is supported by the out…
Which three statements are advantages of using automatic summ…
C. Automatic summarization is disabled…
Refer to the exhibit. Router R3 is receiving multiple routes…
B. 172.16.0.0/16... D. 192.168.10.0/24
Refer to the exhibit. All networks are active in the same EIG…
16 terms
SSAPW0: Chapter 8 Networks of Communication and Exchange
Silk Road
Parthians
stirrup
Indian Ocean Maritime System
Caravan routes connecting China and the Middle East across Ce…
Iranian ruling dynasty between ca. 250 B.C.E. and 226 C.E
Device for securing a horseman's feet, enabling him to wield…
In premodern times, a network of seaports, trade routes, and…
Silk Road
Caravan routes connecting China and the Middle East across Ce…
Parthians
Iranian ruling dynasty between ca. 250 B.C.E. and 226 C.E
20 terms
Network+ Guide to Networks Chapter 8 - 6th Ed. Review
To transmit and receive signals to and…
which of the following is not true abo…
You are setting up a WLAN for an insur…
Which of the following 802.11 transmis…
Omnidirectional... Defined: issues and receives wireless signals…
Multipath signaling uses less energy and results in clearer r…
Infrastructure
A destination node must issue an acknowledgment for every pac…
To transmit and receive signals to and…
Omnidirectional... Defined: issues and receives wireless signals…
which of the following is not true abo…
Multipath signaling uses less energy and results in clearer r…
94 terms
Network+ Chapter 8
1G
2.4-GHz band
2G
3G
The first generation of mobile phone services, popular in the…
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
Second-generation mobile phone service, popular in the 1990s.…
Third-generation mobile phone service, released in the early…
1G
The first generation of mobile phone services, popular in the…
2.4-GHz band
The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.…
26 terms
Chapter 8: Communications and Networks
A network topology in which the centra…
A service that uses existing phone lin…
A wireless access point that provides…
All communications between a company's…
Tree
DSL
Hotspot
Proxy
A network topology in which the centra…
Tree
A service that uses existing phone lin…
DSL
30 terms
Network+ Chapter 8 Network Risk Management
Your organization has just approved a…
What wireless attack might a potential…
What kind of vulnerability is exploite…
Which type of DoS attack orchestrates…
D. Posture assessment
A. Jamming
B. Buffer overflow
C. DRDoS (distributed reflector DoS) attack
Your organization has just approved a…
D. Posture assessment
What wireless attack might a potential…
A. Jamming
41 terms
Wireless Network Security - Chapter 8
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range radio frequency (…
AES-CCMP
The encryption protocol standard for WPA2.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
76 terms
Network Chapter 8
WAN- Wide Access Network
GAN- Golbal Area Network
WAN Devices
Modem
A netowrk that spans a large area, often across myltiple geog…
...
An able you to connect LANs together.
Enable digital data to be sent over an analog medium cinch as…
WAN- Wide Access Network
A netowrk that spans a large area, often across myltiple geog…
GAN- Golbal Area Network
...
38 terms
Chapter 8 - Networks of Communication & Exchange
Silk Road
Parthians
Sasanid Empire
Stirrup
caravan routes connecting china and the middle east across ce…
iranian ruling dynasty
iranian empire with a capital in ctesiphon, mesopotamia; esta…
device for securing a horseman's feet, enabling him to wield…
Silk Road
caravan routes connecting china and the middle east across ce…
Parthians
iranian ruling dynasty
36 terms
Security+ Chapter 8: Securing Networks
Firewall
Packet filtering firewall
Stateful inspection firewall
Application-level firewall
a device that protects an internal network from access by una…
a firewall that analyzes each network packet destined for ins…
A firewall that filters packets and maintains a record of the…
a firewall that is aware of specific applications and service…
Firewall
a device that protects an internal network from access by una…
Packet filtering firewall
a firewall that analyzes each network packet destined for ins…
36 terms
Security+ Chapter 8: Securing Networks
Firewall
Packet filtering firewall
Stateful inspection firewall
Application-level firewall
a device that protects an internal network from access by una…
a firewall that analyzes each network packet destined for ins…
A firewall that filters packets and maintains a record of the…
a firewall that is aware of specific applications and service…
Firewall
a device that protects an internal network from access by una…
Packet filtering firewall
a firewall that analyzes each network packet destined for ins…
25 terms
Introduction to Networks - Chapter 8 Vocabulary
subnetwork
American Standard Code for Information…
octet
network address
See subnet. A group of IP addresses that have the same value…
An 8-bit code for character representation (7 bits plus parit…
A group of 8 binary bits. It is similar to, but not the same…
A dotted decimal number defined by IPv4 protocol to represent…
subnetwork
See subnet. A group of IP addresses that have the same value…
American Standard Code for Information…
An 8-bit code for character representation (7 bits plus parit…
1 of 10