Network + 2018

  1. Is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
    SNMPV3 - Simple Network Management Protocol
  2. Is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, this is a separate protocol that handles authentication, authorization, and accounting (AAA) services.
    TACACS+ - Terminal Access Controller Access-Control System Plus
  3. In computer security, this is (sometimes referred to as a perimeter network) is a physical or logical sub network that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
    DMZ or demilitarized zone
  4. This is a standardized exterior gateway protocol designed to exchange routing and reach-ability information among autonomous systems (AS) on the Internet. The protocol is classified as a path vector protocol.
    BGP routing - Border Gateway Protocol
  5. This is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
    RADIUS - Remote Authentication Dial-In User Service
  6. This is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
    802.1X - IEEE 802.1X
  7. Is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. To do this, VTP carries VLAN information to all the switches in a VTP domain.
    VTP Trunking - VLAN Trunking Protocol (VTP)
  8. Is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS).
    OSPF - Open Shortest Path First (OSPF)
  9. Is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.
    PAN - A personal area network (PAN)
  10. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0.
    APIPA address
  11. The original IEEE 802.3-2003 PoE standard provides up to 15.4 W of DC power (minimum 44 V DC and 350 mA) on each port.
    802.3af
  12. The act of applying a set of rules to the posture data to provide an assessment (posture token) of the level of trust that you can place in that endpoint. The posture token is one of the conditions in the authorization rules for network access.
    Posture validation, or posture assessment
  13. A thorough and accurate chain of custody provides documentation to authenticate ESI by written certificate instead of live testimony under Amended Rule 902
    Chain of Custody
  14. Is a draft standard protocol for encapsulating SCSI command into Transmission Control Protocol/Internet Protocol (TCP/IP) packets and enabling I/O block data transport over IP networks. iSCSI can be used to build IP-based SANs.
    iSCSI - Internet SCSI (iSCSI)
  15. In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
    Split horizon
  16. The MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. ... Like most hash functions, MD5 is neither encryption nor encoding.
    MD5 hash
  17. Is a technology that puts data from different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength.
    DWDM - Dense wavelength division multiplexing (DWDM)
  18. Coaxial cable for television signals
    RG6
  19. Is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation. MIMO has become an essential element of wireless communication standards including IEEE 802.11n (Wi-Fi), IEEE 802.11ac (Wi-Fi)
    MIMO - In radio, multiple-input and multiple-output, or MIMO
  20. Is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
    SaaS - Software as a service (SaaS; pronounced /sæs/)
  21. Is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
    AUP - An acceptable use policy (AUP)
  22. Refers to systems that are durable and likely to operate continuously without failure for a long time.
    High Availability
  23. Is a term for the small office or home office environment
    SOHO
  24. In project management, this is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract. port 3389
    SOW - A statement of work (SOW)
  25. This iport is used for direct TCP/IP MS Networking access without the need for a NetBIOS layer.
    port 445 - TCP port 445
  26. Real-time Transport Protocol (RTP).  What port?
    port 5004
  27. Session Initiation Protocol (SIP).   What port?
    port 5060
  28. This network is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other in applications without a host computer.
    Can network - A Controller Area Network (CAN bus)
  29. What does a WAN network stand for?
    Wide Area Network
  30. This kind of network is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.
    Pan Network - A personal area network (PAN)
  31. What does a Man Network stand for?
    Metropolitan area network
  32. In computing, This is a request method supported by HTTP used by the World Wide Web. By design, this method requests that a web server accepts the data enclosed in the body of the request message, most likely for storing it. It is often used when uploading a file or when submitting a completed web form.
    Post request
  33. Attack on a target using spoofed ICMP packets to flood it.
    SMURF Attack
  34. Is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution this must exploit a security vulnerability in an applications software
    SQL Injection Attack
  35. In cryptography and computer security, this is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
    Man in the middle attack (mitm)
  36. Unified communications management, is essentially the management of Unified communications; it refers to the systems used by enterprise organizations to automate their enterprise communications services and the voice network infrastructure that those services run over (i.e. how they connect to the PSTN).
    UC gateway
  37. This kind of router is a specialized router located at a network boundary that enables a campus network to connect to external networks. They are primarily used at two demarcation points: the wide area network (WAN) and the internet.
    Edge Router
  38. This is a commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user.
    SLA - Service Level Agreement
  39. This is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. To do this, it carries VLAN information to all the switches in a VTP domain. Also the advertisements can be sent over 802.1Q, and ISL trunks.
    VTP Protocol - VLAN Trunking Protocol (VTP)
  40. This is a type of data-carrying technique for high-performance telecommunications networks. This directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.
    MPLS - Multiprotocol Label Switching (MPLS)
  41. This is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of thisis to prevent bridge loops and the broadcast radiation that results from them. it also allows a network design to include backup links to provide fault tolerance
    STP - The Spanning Tree Protocol (STP)
  42. This is an obsolete method for implementing virtual private networks, with many known security issues. This uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets.
    PPTP - The Point-to-Point Tunneling Protocol (PPTP)
  43. In the field of computer security, security information and event management its software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
    SIEM
  44. This was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommunications devices to emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. Tempest's name is believed to have been a code name used during development by the U. S. government in the late 1960s, but at a somewhat later stage, it became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. Today, in military circles, the term has been officially supplanted by Emsec (for Emissions Security); however, the term Tempest is still widely used in the civilian arena.
    TEMPEST
  45. This is an optical multiplexing technology used to increase bandwidth over existing fiber networks. This works by combining and transmitting multiple signals simultaneously at different wavelengths on the same fiber.
    DWDM - Dense Wavelength Division Multiplexing (DWDM)
  46. This is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver). The antennas at each end of the communications circuit are combined to minimize errors and optimize data speed.
    MIMO - MIMO (multiple input, multiple output)
  47. This is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV (CATV) system.
    DOCSIS - Data Over Cable Service Interface Specification (DOCSIS /ˈdɒksɪs/)
  48. This is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
    VLAN hopping -LAN hopping
  49. A set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks uses this to physically monitor the traffic on the line at participating stations.
    CSMA/CD - Short for Carrier Sense Multiple Access / Collision Detection
  50. An effect that happens to signals on a bus topology network when the ends of the bus are improperly terminated or unterminated. A signal that is placed on a bus that is unterminated will continue to reflect from the end of the bus until that signal is attenuated by the impedance of the cable.
    Bounce Wireless
  51. "                " which is measured to the inside curvature, is the minimum radius one can bend a pipe, tube, sheet, cable or hose without kinking it, damaging it, or shortening its life. The smaller the bend radius, the greater is the material flexibility (as the radius of curvature decreases, the curvature increases).
    Bend radius - Bend radius
  52. These connectors were once very common on PCs and servers. They are designed to work with the EIA/TIA 232 serial interface standard, which determined the function of all nine pins as a standard, so that multiple companies could design them into their products. These connectors were commonly used for serial
    DB-9 - DB9 connectors
  53. This is a standard specification for Ethernet, a method of physical communication in a local area network (LAN), which is maintained by the Institute of Electrical and Electronics Engineers (IEEE). In general, it  specifies the physical media and the working characteristics of Ethernet.
    802.3 - 802.3
  54. This is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells. This is different from Ethernet or internet, which use variable packet sizes for data or frames.
    ATM - asynchronous transfer mode (ATM)
  55. This is a local area network in which a node can transmit only when in possession of a sequence of bits (called the token) that is passed to each node in turn.
    Token Ring
  56. This is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. The full RS-232C standard specifies a 25-pin "D" connector of which 22 pins are used.
    RS-232 - Recommend Standard number 232
  57. In telecommunications, this is a method for a system to provide network access to many clients by sharing a set of lines or frequencies instead of providing them individually. This is analogous to the structure of a tree with one trunk and many branches.
    TRUNK - Trunking
  58. This is a method for allocating IP addresses and IP routing. The Internet Engineering Task Force introduced this in 1993 to replace the previous addressing architecture of classful network design in the Internet. Its goal was to slow the growth of routing tables on routers across the Internet
    CIDR - Classless Inter-Domain Routing
  59. Is a method of preventing a routing loop in a network
    Split Horizon
  60. This is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls
    SIP – Session Initiation Protocol
  61. This a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, this is a separate protocol that handles authentication, authorization, and accounting (AAA) services
    TACACS+ Server - Terminal Access Controller Access-Control System
  62. This is an interoperable, standards-based protocol that is defined in RFCs 3413 to 3415Uses DES to encrypt data
    SNMPv3 - Simple Network Management Protocol version 3
  63. Both versions of RIP, are Distance Vector Routing Protocols that use router hop counts as their metrics. They support a maximum hop count value of 15. Any router farther than 15 hops away is considered to be unreachable.
    RIPv2 - Routing Information Protocol Version 2.
  64. A cable rack that interconnects and manages the telecommunications wiring between itself and any number of IDFs. Unlike an IDF, which connects internal lines to the MDF, the MDF connects private or public lines coming into a building with the internal network.
    MDF Rack-  Main distribution frame
  65. This is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of this is to prevent bridge loops and the broadcast radiation that results from them.
    Spanning Tree - The Spanning Tree Protocol (STP)
  66. This is a protocol used by the Internet Protocol (IP) [RFC826], specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.
    ARP - The address resolution protocol (arp)
  67. This known as SPAN (Switched Port Analyzer), is a method of monitoring network traffic. With this enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed.
    Port mirroring
  68. What does MDF stand for?
    Main Distribution Frame
  69. This is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
    802.1x
Author
bwbarnes50
ID
340094
Card Set
Network + 2018
Description
Network + Questions
Updated