IEEE Networking Standards Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of spatial multiplexing in MU-MIMO technology?

  • To limit the number of devices connected to the network.
  • To increase the throughput of a single user connection.
  • To connect multiple MU-MIMO-capable stations simultaneously. (correct)
  • To enhance security by encrypting data packets.

What does the native VLAN ID represent in a network trunk port configuration?

  • The default gateway for the trunked devices.
  • The priority level of traffic flowing through the trunk.
  • The VLAN ID for untagged frames received on the trunk port. (correct)
  • The maximum transmission unit (MTU) setting for the VLAN.

What does Network Address Translation (NAT) achieve in relation to IPv4 and IPv6?

  • It simplifies routing of IPv4 packets over IPv6 networks.
  • It completely eliminates the need for public IP addresses.
  • It directly connects IPv4 networks without addressing changes.
  • It converts destination IPv4 addresses to IPv6 format at routing boundaries. (correct)

What is the purpose of the Neighbor Discovery protocol in IPv6?

<p>To identify link-local nodes on the network. (B)</p> Signup and view all the answers

What does NetFlow provide in terms of network monitoring?

<p>Detailed insights into IP traffic flows used by applications and hosts. (A)</p> Signup and view all the answers

What is the primary purpose of a security assertion markup language (SAML)?

<p>To authenticate users between a client and a service (D)</p> Signup and view all the answers

Which of the following best describes Network Access Control (NAC)?

<p>A system for authenticating and authorizing device access to a network. (A)</p> Signup and view all the answers

What does a self-signed certificate indicate?

<p>It is issued by the entity itself and not by a CA (B)</p> Signup and view all the answers

What is the function of network attached storage (NAS)?

<p>To enable access to file storage via network protocols like FTP and SMB. (A)</p> Signup and view all the answers

What functionality does the server message block (SMB) protocol provide?

<p>Exchanging files and printers between machines (C)</p> Signup and view all the answers

What does a network loop refer to in a network troubleshooting context?

<p>An endless loop where layer 2 frames are continuously forwarded. (B)</p> Signup and view all the answers

In which layer of the OSI model does the session layer operate?

<p>Layer 5 (A)</p> Signup and view all the answers

What does a Service Level Agreement (SLA) typically define?

<p>The service expectations between a provider and a consumer (D)</p> Signup and view all the answers

What is shadow IT?

<p>Unauthorized use of technology within a private network (B)</p> Signup and view all the answers

What is the main risk associated with shoulder surfing?

<p>Obtaining sensitive information like passwords and PINs (A)</p> Signup and view all the answers

What is the primary role of the Session Initiation Protocol (SIP)?

<p>To establish and manage communication sessions (A)</p> Signup and view all the answers

What is the primary function of fiber optic cable?

<p>To transmit light signals for data communication (C)</p> Signup and view all the answers

Which of the following characteristics is NOT associated with fiber optic cables?

<p>High susceptibility to electromagnetic interference (C)</p> Signup and view all the answers

What does full-duplex mean in networking?

<p>Data can be sent and received simultaneously (B)</p> Signup and view all the answers

Which protocol is specifically associated with file transfer in a network?

<p>File Transfer Protocol (FTP) (B)</p> Signup and view all the answers

What does a pre-shared key (PSK) mechanism facilitate in a wireless network?

<p>Group authentication to the wireless network. (A)</p> Signup and view all the answers

What is the purpose of the cladding in fiber optic cables?

<p>To reflect light back to the core for efficient transmission (D)</p> Signup and view all the answers

What is meant by fully qualified domain name (FQDN)?

<p>A unique label that identifies a host within a DNS hierarchy (C)</p> Signup and view all the answers

Which type of PBX combines the features of both software and traditional hardware?

<p>Hybrid PBX (A)</p> Signup and view all the answers

What is the role of a firewall in a network?

<p>To filter packets and protect against unauthorized access (D)</p> Signup and view all the answers

In asymmetric encryption, who possesses the private key?

<p>The holder alone. (D)</p> Signup and view all the answers

What is the primary function of a protocol analyzer?

<p>To parse and analyze protocol data. (D)</p> Signup and view all the answers

Which of the following is NOT a characteristic of a Fiber Channel protocol?

<p>It allows for file transfer using FTP protocols (A)</p> Signup and view all the answers

What distinguishes a private cloud from a public cloud?

<p>Private cloud is for a single entity's use. (C)</p> Signup and view all the answers

What is the role of the public key in asymmetric encryption?

<p>It can decrypt messages encrypted with the private key. (D)</p> Signup and view all the answers

What does a proxy server primarily do?

<p>Mediates communication between a client and another server. (B)</p> Signup and view all the answers

Which statement best describes public switched telephone network (PSTN)?

<p>A global network connecting national telecommunications systems. (B)</p> Signup and view all the answers

What is the primary purpose of VoIP technology?

<p>To carry voice traffic over data networks. (A)</p> Signup and view all the answers

Which term describes a security breach that can be triggered accidentally or exploited intentionally?

<p>Vulnerability (C)</p> Signup and view all the answers

What is a warm site in the context of disaster recovery?

<p>A dormant site that can be activated quickly. (D)</p> Signup and view all the answers

What does WPA stand for in relation to Wi-Fi security?

<p>Wireless Protected Access (D)</p> Signup and view all the answers

What role does a Wi-Fi analyzer play in wireless networking?

<p>It reports characteristics of a WLAN, such as signal strength. (D)</p> Signup and view all the answers

What does a wire map tester verify?

<p>Termination and pinouts of cables. (C)</p> Signup and view all the answers

What is the purpose of a wiring diagram?

<p>To document connector pinouts and cable runs. (C)</p> Signup and view all the answers

What does WMN stand for in wireless networking?

<p>Wireless Mesh Network (D)</p> Signup and view all the answers

What does RDP primarily allow a user to do?

<p>Access a remote desktop interface (D)</p> Signup and view all the answers

Which TCP port does RDP use?

<p>3389 (B)</p> Signup and view all the answers

What defines the private address ranges according to RFC 1918?

<p>Specific IP address ranges reserved for private networks (B)</p> Signup and view all the answers

What does a rogue access point refer to in networking?

<p>A device on the network without authorization (B)</p> Signup and view all the answers

How does the role-based access control (RBAC) model manage user permissions?

<p>By using access control lists that administrators manage (D)</p> Signup and view all the answers

What is the main purpose of resource records in DNS?

<p>To store information about a DNS zone (C)</p> Signup and view all the answers

Which of the following best describes a router?

<p>An intermediate system that forwards packets between networks (A)</p> Signup and view all the answers

What is the purpose of IP address reservation in DHCP?

<p>To assign a permanent IP address based on a device's hardware address (C)</p> Signup and view all the answers

Flashcards

fiber distribution panel

Type of distribution frame with pre-wired connectors used with fiber optic cabling.

fiber optic cable

Network cable type that uses light signals as the basis for data transmission. Infrared light pulses are transmitted down the glass core of the fiber. The cladding that surrounds this core reflects light back to ensure transmission efficiency. At the receiving end of the cable, light-sensitive diodes re-convert the light pulse into an electrical signal. Fiber optic cable is immune to eavesdropping and EMI, has low attenuation, supports rates of 10 Gb/s+, and is light and compact.

fibre channel

High-speed network communications protocol used to implement SANs.

firewall

Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

Signup and view all the flashcards

first hop redundancy protocols (FHRPs)

Provisioning failover routers to serve as the default gateway for a subnet. Also referred to as Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP).

Signup and view all the flashcards

fragmentation

Mechanism for splitting a layer 3 datagram between multiple frames to fit the maximum transmission unit (MTU) of the underlying Data Link network.

Signup and view all the flashcards

frame

Common term for the protocol data unit for layer 2.

Signup and view all the flashcards

general data protection regulation (GDPR)

Provisions and requirements protecting the personal data of European Union (EU) citizens.

Signup and view all the flashcards

NetFlow

A Cisco-developed method for collecting and reporting network traffic information to a structured database. It helps analyze IP traffic flows used by various network applications and hosts.

Signup and view all the flashcards

Network Address Translation (NAT)

A routing mechanism that translates between a single public address on the external network side of a router and private, non-routable addresses used internally.

Signup and view all the flashcards

Network Attached Storage (NAS)

A storage device enclosure with a network port and an embedded operating system supporting common network file access protocols like FTP and SMB.

Signup and view all the flashcards

Network Adapter

A network adapter card provides one or more Ethernet ports to connect hosts to a network, enabling data exchange over a link.

Signup and view all the flashcards

NAT64

The IPv6 transition mechanism that uses Network Address Translation (NAT) to convert destination IPv4 addresses to IPv6 format at routing boundaries.

Signup and view all the flashcards

Network Layer (Layer 3)

The OSI model layer responsible for logical network addressing and forwarding.

Signup and view all the flashcards

Multiuser MIMO (MU-MIMO)

The use of spatial multiplexing to connect multiple MU-MIMO-capable stations simultaneously, provided they are not on the same directional path.

Signup and view all the flashcards

Network Access Control (NAC)

General term for the protocols, policies, and hardware that authenticate and authorize access to a network at the device level.

Signup and view all the flashcards

WPA/WPA2-PSK

A wireless network authentication mode that uses a shared passphrase to derive an encryption key, enabling group authentication.

Signup and view all the flashcards

Private Cloud

A type of cloud computing that is specifically deployed and managed for use by a single entity.

Signup and view all the flashcards

PBX (Private Branch Exchange)

A communication system that routes incoming calls to direct dial numbers and provides features like voicemail, call distribution, and interactive menus.

Signup and view all the flashcards

Asymmetric Encryption (Private Key)

A type of encryption where the private key is only known to the owner and is linked to, but not derived from, a publicly distributed key.

Signup and view all the flashcards

Production Configuration

Settings that are used when a device, software, or application is started or launched.

Signup and view all the flashcards

Protocol Analyzer (Packet Analyzer)

A specialized tool used to analyze and interpret the contents of network packets for troubleshooting or security analysis.

Signup and view all the flashcards

Proxy Server

A server that acts as an intermediary between a client and another server, filtering, modifying, and potentially caching communications to improve performance.

Signup and view all the flashcards

Public Cloud

A type of cloud computing infrastructure accessible to many independent entities or companies.

Signup and view all the flashcards

Remote Authentication

A protocol used for managing remote and wireless authentication, often used with RADIUS.

Signup and view all the flashcards

Remote Desktop Protocol (RDP)

A protocol used for operating remote connections to a host using a graphical interface. It sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

Signup and view all the flashcards

Repeater

A layer 1 device that regenerates and retransmits signals to overcome media distance limitations.

Signup and view all the flashcards

Reservation

A DHCP configuration that assigns either a pre-reserved or persistent IP address to a given host, based on its hardware address or other ID.

Signup and view all the flashcards

Resource Records

Data files storing information about a DNS zone. The main records are as follows: A (maps a host name to an IPv4 address), AAAA (maps to an IPv6 address), CNAME (an alias for a host name), MX (the IP address of a mail server), and PTR (allows a host name to be identified from an IP address).

Signup and view all the flashcards

Reverse DNS

A DNS query type to resolve an IP address to a host name.

Signup and view all the flashcards

RFC 1918

Standards document that defines private address ranges.

Signup and view all the flashcards

Risk

The likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

Signup and view all the flashcards

Security Assertion

An XML-based data format used to exchange authentication information between a client and a service. (Example: SAML)

Signup and view all the flashcards

Security Information and Event Management (SIEM)

A solution that provides real-time or near-real-time analysis of security alerts and events generated by network hardware and applications.

Signup and view all the flashcards

Security Service Edge (SSE)

A design paradigm and associated technologies that mediate access to cloud services and web applications.

Signup and view all the flashcards

Self-Signed Certificate

A digital certificate that has been signed by the entity that issued it, rather than by a CA.

Signup and view all the flashcards

Server Message Block (SMB)

Application protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thus making them available for other machines to use. SMB client software is available for UNIX-based systems. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients. Also called Common Internet File System (CIFS).

Signup and view all the flashcards

Service Level Agreement (SLA)

Agreement that sets the service requirements and expectations between a consumer and a provider.

Signup and view all the flashcards

Session Initiation Protocol (SIP)

Application protocol used to establish, disestablish, and manage VoIP and conferencing communications sessions. It handles user discovery (locating a user on the network), availability advertising (whether a user is prepared to receive calls), negotiating session parameters (such as use of audio/video), and session management and termination.

Signup and view all the flashcards

Session Layer (Layer 5)

OSI model layer that provides services for applications that need to exchange multiple messages (dialog control). Also referred to as layer 5.

Signup and view all the flashcards

Voice over IP (VoIP)

A technology that allows voice calls to be transmitted over a data network.

Signup and view all the flashcards

VoIP phone

A device or client software used to make and receive VoIP calls.

Signup and view all the flashcards

Vulnerability

A weakness in a system that could be exploited to cause a security breach.

Signup and view all the flashcards

Vulnerability Assessment

A process of evaluating a system's security and compliance, often by testing vulnerabilities.

Signup and view all the flashcards

Warm site

A backup site that can quickly be activated in case of an outage.

Signup and view all the flashcards

Wide area network (WAN)

A network that spans a large geographic area, using various media types and protocols.

Signup and view all the flashcards

Wi-Fi Analyzer

A tool used to analyze Wi-Fi networks, showing signal strength and channel usage.

Signup and view all the flashcards

YAML (YAML Ain't Markup Language)

A language for creating configuration files and applications, often used in network automation.

Signup and view all the flashcards

Study Notes

IEEE Standards

  • IEEE standards specify wireless networking using spread spectrum radio transmission in 2.4 GHz and 5 GHz bands. Wi-Fi has iterations: a, b, g, Wi-Fi 4 (n), Wi-Fi 5 (ac), and Wi-Fi 6 (ax).
  • The iterations standardize modulation techniques, distances, data rates, and features like channel bonding, MIMO, and MU-MIMO.
  • 802.11h amendment defines Dynamic Frequency Selection (DFS) to prevent interference with radar and cellular communications in the 5 GHz band.

802.1 Standards

  • 802.1p defines a 3-bit class of service priority field in 802.1Q format.
  • 802.1q is a protocol for trunking, enabling switches to exchange data about VLAN configurations. It is used to tag frames for different VLANs across trunk links.
  • 802.1x is for port-based authentication, also known as port-based network access control.

Ethernet Standards

  • 802.3 standards detail media types, access methods, data rates, and distance limitations at OSI layers 1 and 2, using xBASE-y designations.

Access Control

  • Access control lists (ACLs) determine access privileges (read-only, read/write) to objects.
  • Access points (APs) connect wireless devices to wired networks and implement Infrastructure WLAN.
  • Access/edge layers are the lowest hierarchical configuration used as the attachment point for end systems.
  • Active-active cluster configuration utilizes all nodes continually.
  • Active-passive cluster utilizes one or more nodes only during failover for high availability.
  • Ad hoc networks allow connected devices to communicate directly without established mediums and are also called Independent Basic Service Sets (IBSS).

Additional Addressing and Protocols

  • Address Resolution Protocol (ARP) matches hardware MAC addresses to local IP addresses.
  • Addressing includes MAC, IPv4, and IPv6.
  • Adjacent Channel Interference (ACI) occurs when access points are configured on overlapping channels.
  • Administrative Distance (AD) measures the trustworthiness of routing protocols.
  • Advanced Persistent Threats (APTs) have the ability to obtain, maintain, and diversify unauthorized access to systems over long periods.
  • Angled physical contact (APC) is an optic connector type using an angled polish for the ferrule.
  • Antenna types are omnidirectional and unidirectional, commonly used for wireless signals.
  • Anycast is an IP delivery method where a packet is addressed to a single host from a group.
  • Layer 7, or application layer, is responsible for network services like file transfer, printing, email, databases and more.
  • Application Programming Interfaces (APIs) provide interactions between scripts or apps and a program or a web app.
  • ARP command displays/modifies IP-MAC address mappings in host's cache.
  • ARP spoofing is a network attack that redirects an IP address to a wrong MAC address.
  • Attenuation measures a signal's decrease in strength as it travels through a medium.
  • Authentication Header (AH) assures data origin, integrity, and protection against replay attacks in IPSec protocol.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Networks Glossary PDF

More Like This

Use Quizgecko on...
Browser
Browser