Podcast
Questions and Answers
What is the name of the IEEE standard for wireless networking based on spread spectrum radio transmission?
What is the name of the IEEE standard for wireless networking based on spread spectrum radio transmission?
802.11
What are the two frequency bands used by 802.11 standards for wireless networking?
What are the two frequency bands used by 802.11 standards for wireless networking?
What does the 802.11h amendment define?
What does the 802.11h amendment define?
A Dynamic Frequency Selection (DFS) mechanism
What does the 802.1p standard define?
What does the 802.1p standard define?
Signup and view all the answers
What does the 802.1q protocol provide?
What does the 802.1q protocol provide?
Signup and view all the answers
What is another name for the 802.1x standard?
What is another name for the 802.1x standard?
Signup and view all the answers
What layers of the OSI model do the 802.3 Ethernet standards describe?
What layers of the OSI model do the 802.3 Ethernet standards describe?
Signup and view all the answers
What determines which subjects are allowed or denied access to an object in an access control list (ACL)?
What determines which subjects are allowed or denied access to an object in an access control list (ACL)?
Signup and view all the answers
What is the purpose of an access point (AP) in a wireless network?
What is the purpose of an access point (AP) in a wireless network?
Signup and view all the answers
What is the lowest tier in a hierarchical network topology and what is its role?
What is the lowest tier in a hierarchical network topology and what is its role?
Signup and view all the answers
Describe the active-active high availability cluster configuration.
Describe the active-active high availability cluster configuration.
Signup and view all the answers
What is another name for an ad hoc network?
What is another name for an ad hoc network?
Signup and view all the answers
What is the purpose of the address resolution protocol (ARP)?
What is the purpose of the address resolution protocol (ARP)?
Signup and view all the answers
What is the term for a unique identifier for a network node?
What is the term for a unique identifier for a network node?
Signup and view all the answers
What is the problem known as adjacent channel interference?
What is the problem known as adjacent channel interference?
Signup and view all the answers
What is the term used to determine the trustworthiness of routes derived from different routing protocols?
What is the term used to determine the trustworthiness of routes derived from different routing protocols?
Signup and view all the answers
What does it mean when a switch or router port is administratively down?
What does it mean when a switch or router port is administratively down?
Signup and view all the answers
What is an advanced persistent threat (APT)?
What is an advanced persistent threat (APT)?
Signup and view all the answers
What is the APC connector finishing type used for fiber optic connections?
What is the APC connector finishing type used for fiber optic connections?
Signup and view all the answers
What are the two main types of antenna?
What are the two main types of antenna?
Signup and view all the answers
What is anycast?
What is anycast?
Signup and view all the answers
What is the name and layer of the OSI model that provides support to applications requiring network services?
What is the name and layer of the OSI model that provides support to applications requiring network services?
Signup and view all the answers
What is the purpose of an application programming interface (API)?
What is the purpose of an application programming interface (API)?
Signup and view all the answers
What does the arp command do?
What does the arp command do?
Signup and view all the answers
Describe arp spoofing.
Describe arp spoofing.
Signup and view all the answers
What is attenuation?
What is attenuation?
Signup and view all the answers
What does the authentication header (AH) protocol provide?
What does the authentication header (AH) protocol provide?
Signup and view all the answers
What is the purpose of an authoritative name server?
What is the purpose of an authoritative name server?
Signup and view all the answers
What is automatic private IP addressing (APIPA)?
What is automatic private IP addressing (APIPA)?
Signup and view all the answers
What is the general term for using scripts and APIs to automate tasks without manual intervention?
What is the general term for using scripts and APIs to automate tasks without manual intervention?
Signup and view all the answers
What is an autonomous system (AS)?
What is an autonomous system (AS)?
Signup and view all the answers
What is availability monitoring?
What is availability monitoring?
Signup and view all the answers
What are backup configurations?
What are backup configurations?
Signup and view all the answers
Describe band steering.
Describe band steering.
Signup and view all the answers
What is the general term for the amount of data that can be transferred through a connection over a given period?
What is the general term for the amount of data that can be transferred through a connection over a given period?
Signup and view all the answers
Study Notes
802 Standards
- 802.11 standards: IEEE standards for wireless networking, using 2.4 GHz and 5 GHz bands, including a, b, g, n, ac, and ax iterations. Variations dictate modulation, distance, data rates, and features like channel bonding, MIMO, and MU-MIMO.
- 802.11h: Amendment to Wi-Fi standards, defining Dynamic Frequency Selection (DFS) to avoid interference with radar and cellular communications in the 5 GHz band.
- 802.1p: IEEE standard defining a 3-bit priority field within the 802.1Q format.
- 802.1q: Trunking protocol enabling switches to exchange VLAN configuration data, often tagging frames for different VLANs across trunk links.
- 802.1x: Standard for encapsulating EAP communications over a LAN (EAPoL) to perform port-based authentication, also called port-based network access control (IEEE 802.1X).
- 802.3 ethernet standards: IEEE 802.3 series describes media types, access methods, data rates, and distance limitations at OSI layers 1 and 2 using xBASE-y designations.
Networking Concepts
- Access Control List (ACL): Collection of access control entries (ACEs) controlling access to objects, defining allowed subjects and privileges (read-only, read/write).
- Access Point (AP): Wireless device connecting wireless devices & wired networks, implementing an infrastructure mode WLAN.
- Access/Edge Layer: Lowest hierarchical network layer, the entry point for end systems.
- Active-Active: High availability cluster configuration, utilizing all nodes continuously.
- Active-Passive: High availability cluster configuration, using one or more nodes only during failover.
- Ad Hoc Network: Wireless network where devices communicate directly, also called Independent Basic Service Set (IBSS).
- Address Resolution Protocol (ARP): Broadcast mechanism matching hardware MAC addresses to IP addresses on a local network segment.
- Addressing: Unique identifiers for network nodes (MAC address, IPv4 address, IPv6 address).
- Adjacent Channel Interference (ACI): Troubleshooting issue where access points on overlapping channels cause increased noise.
- Administrative Distance (AD): Metric assessing the trustworthiness of routes from different routing protocols.
- Administratively Down: Purposefully disabled switch or router port via management.
- Advanced Persistent Threat (APT): Sophisticated threat actors maintaining extended unauthorized access to network systems.
- Angled Physical Contact (APC): Fiber optic connector type using an angled ferrule polish.
- Antenna Type: Metal wires for sending and receiving radio signals (omnidirectional or unidirectional).
- Anycast: IP delivery method where a packet is addressed to a single host from a group sharing the same address.
- Application Layer (Layer 7): OSI model layer supporting application network services (file transfer, printing, email).
- Application Programming Interface (API): Methods allowing scripts or apps to interact with other programs or web applications.
- ARP Command: Utility displaying and modifying IP-to-MAC address mappings.
- ARP Spoofing: Network attack redirecting IP address to a non-intended MAC address, creating DoS, spoofing, or on-path attacks.
- Attenuation: Signal degradation during transmission, impacting maximum media distance at a given bit rate.
- Authentication Header (AH): IPSec protocol authenticating data origin, ensuring integrity, and preventing replay attacks.
- Authoritative Name Server: DNS server holding a complete copy of zone records for a specific domain.
- Automatic Private IP Addressing (APIPA): Windows feature automatically assigning address from the 169.254.x.y range when a DHCP server isn't found (link local address).
- Automation: Using scripts and APIs for automatic system provisioning and deprovisioning.
- Autonomous System (AS): Group of network prefixes under a single organization's control determining routing boundaries.
- Availability Monitoring: Reporting and alerting tools checking host or application reachability.
- Backup Configuration: Configuration settings for appliance restoration from backup media.
- Band Steering: Wi-Fi feature guiding clients to a specific frequency band (e.g., 5 GHz).
- Bandwidth: Measure of data transfer rate or range of frequencies supported by transmission media (Hertz).
- Bandwidth Speed Tester: Utility to measure internet link speed or website response times.
- Baseline Metrics: Values assessing service performance or stability based on historical data or vendor guidelines.
- Basic Service Set Identifier (BSSID): MAC address of an access point supporting a basic service area.
- Bayonet Neil-Concelman (BNC) Connector: Twist-and-lock connector for coaxial cable.
- Bidirectional Wavelength Division Multiplexing (BWDM): Technology enabling bidirectional data transfer over a single fiber using different wavelengths for transmit and receive.
- Bit Rate: Data transfer rate over a network connection (measured in bits/bytes/second).
- Border Gateway Protocol (BGP): Path vector exterior gateway routing protocol used by ISPs to route between autonomous systems.
- Botnet: Infected hosts controlled by a bot program for exploiting attacks.
- Bottleneck: Network or system performance constraint from a single link, device, or subsystem.
- Bridge: System isolating collision domains, joining segments within the same broadcast domain.
- Bring Your Own Device (BYOD): Security framework and tools for personally owned devices accessing corporate networks.
- Broadcast: Packet addressed to all hosts on a local network (routable).
- Broadcast Domain: Network segment where all nodes receive broadcast frames.
- Broadcast Storm: Amplified traffic caused by loops in switching, slowing and crashing switches.
- Brute Force: Password attack trying every possible combination.
- Bugfix: Software update addressing a single error.
- Business Continuity Plan (BCP): Processes for maintaining business operations during adverse events.
- Business Impact Analysis (BIA): Identifying organizational risks and their effect on critical operations.
- Cable Crimper: Tool for joining network jacks to patch cables.
- Cable Map: Physical plan of cable routes in a building.
- Cable Stripper: Tool for stripping cable jackets or insulation.
- Cable Tester: Tool confirming end-to-end cable connection.
- Canonical Notation: Format for representing IPv6 addresses using hex, colon delimitation, and zero compression.
- Captive Portal: Web page requiring client authentication for network access.
- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): Contention mechanism used by 802.11 Wi-Fi.
- Carrier Sense Multiple Access with Collision Detection (CSMA/CD): Contention-based protocol detecting collisions on shared media.
- Categories of Cable Standards: ANSI/TIA/EIA cable category designations.
- Cellular Radio: Data access standards over cellular networks (2G, 3G, 4G, 5G).
- Certificate Authority (CA): Server issuing digital certificates ensuring subject identity.
- Change Management: Process for approving, preparing, supporting, and managing new or updated systems.
- Channel Bonding: Aggregating adjacent channels for increased bandwidth.
- CIA Triad: Principles of security control—confidentiality, integrity, and availability.
- Cipher Suite: Lists of cryptographic algorithms for secure connections.
- Cisco Discovery Protocol (CDP): Cisco protocol discovering layer-2 neighbors.
- Classful Addressing: Legacy IP addressing method determining the network ID automatically.
- Classless Interdomain Routing (CIDR): Using network prefixes to aggregate routes.
- Client-Server: Administration model where servers provide services and clients consume them.
- Cloud Access Security Broker (CASB): Enterprise software mediating cloud service access.
- Cloud Deployment Model: Classifying cloud ownership and management (public, private, community, hybrid).
- Cloud Direct Connection: Dedicated link between on-premises network and cloud service provider.
- Cloud Gateway: Virtual router facilitating routing between subnets and public networks in cloud infrastructure.
- Cloud Service Model: Classifying cloud service provision (software, platform, infrastructure).
- Clustering: Load balancing technique using a group of servers working together.
- Coarse Wavelength Division Multiplexing (CWDM): Technology for multiplexing signals on a single fibre.
- Coaxial: Two-conductor media type using a common axis (RG specifications).
- Co-channel Interference (CCI): Troubleshooting issue where access points use the same channel causing contention.
- Cold Site: Predetermined alternate location for network rebuild after disasters.
- Collapsed Core: Two-tier topology where access layer switches connect directly to a core layer.
- Collision Domain: Network segment where nodes share access media.
- Colocation: Deploying servers and network appliances in a shared datacenter.
- Command and Control (C&C or C2): Attackers' infrastructure controlling botnet malware.
- Community String: SNMP password-like value allowing management access to an agent.
- Configuration Drift: Risk of systems deviating from baseline or golden configuration.
- Configuration Management: Process maintaining controlled information systems components.
- Configuration Monitoring: Reporting and alerting configurations deviating from baselines.
- Content Filtering: Security measure blocking inappropriate content from email and internet traffic.
- Convergence: Process where routers agree on network paths (steady state).
- Core Layer: Highest layer in a hierarchical topology, providing interconnection.
- Crosstalk: Interference between wires due to close proximity.
- Cryptographic Hash Algorithm: Function converting variable-length input to fixed-length output.
- Cyclic Redundancy Check (CRC): Checksum calculation detecting errors in frames.
- Data at Rest: Stored information.
- Data Center Interconnect (DCI): Technologies linking hosts in separated datacenter facilities.
- Data in Transit: Information being transmitted between hosts.
- Data Link Layer (Layer 2): OSI layer transferring data between network nodes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the various IEEE 802 standards related to networking, including wireless protocols like 802.11 and Ethernet standards like 802.3. You'll learn about different amendments, VLAN configurations, and network access control mechanisms. Test your knowledge on the key features and functionalities of these critical networking standards.