Podcast
Questions and Answers
What is the primary function of spatial multiplexing in MU-MIMO technology?
What is the primary function of spatial multiplexing in MU-MIMO technology?
- To limit the number of devices connected to the network.
- To increase the throughput of a single user connection.
- To connect multiple MU-MIMO-capable stations simultaneously. (correct)
- To enhance security by encrypting data packets.
What does the native VLAN ID represent in a network trunk port configuration?
What does the native VLAN ID represent in a network trunk port configuration?
- The default gateway for the trunked devices.
- The priority level of traffic flowing through the trunk.
- The VLAN ID for untagged frames received on the trunk port. (correct)
- The maximum transmission unit (MTU) setting for the VLAN.
What does Network Address Translation (NAT) achieve in relation to IPv4 and IPv6?
What does Network Address Translation (NAT) achieve in relation to IPv4 and IPv6?
- It simplifies routing of IPv4 packets over IPv6 networks.
- It completely eliminates the need for public IP addresses.
- It directly connects IPv4 networks without addressing changes.
- It converts destination IPv4 addresses to IPv6 format at routing boundaries. (correct)
What is the purpose of the Neighbor Discovery protocol in IPv6?
What is the purpose of the Neighbor Discovery protocol in IPv6?
What does NetFlow provide in terms of network monitoring?
What does NetFlow provide in terms of network monitoring?
What is the primary purpose of a security assertion markup language (SAML)?
What is the primary purpose of a security assertion markup language (SAML)?
Which of the following best describes Network Access Control (NAC)?
Which of the following best describes Network Access Control (NAC)?
What does a self-signed certificate indicate?
What does a self-signed certificate indicate?
What is the function of network attached storage (NAS)?
What is the function of network attached storage (NAS)?
What functionality does the server message block (SMB) protocol provide?
What functionality does the server message block (SMB) protocol provide?
What does a network loop refer to in a network troubleshooting context?
What does a network loop refer to in a network troubleshooting context?
In which layer of the OSI model does the session layer operate?
In which layer of the OSI model does the session layer operate?
What does a Service Level Agreement (SLA) typically define?
What does a Service Level Agreement (SLA) typically define?
What is shadow IT?
What is shadow IT?
What is the main risk associated with shoulder surfing?
What is the main risk associated with shoulder surfing?
What is the primary role of the Session Initiation Protocol (SIP)?
What is the primary role of the Session Initiation Protocol (SIP)?
What is the primary function of fiber optic cable?
What is the primary function of fiber optic cable?
Which of the following characteristics is NOT associated with fiber optic cables?
Which of the following characteristics is NOT associated with fiber optic cables?
What does full-duplex mean in networking?
What does full-duplex mean in networking?
Which protocol is specifically associated with file transfer in a network?
Which protocol is specifically associated with file transfer in a network?
What does a pre-shared key (PSK) mechanism facilitate in a wireless network?
What does a pre-shared key (PSK) mechanism facilitate in a wireless network?
What is the purpose of the cladding in fiber optic cables?
What is the purpose of the cladding in fiber optic cables?
What is meant by fully qualified domain name (FQDN)?
What is meant by fully qualified domain name (FQDN)?
Which type of PBX combines the features of both software and traditional hardware?
Which type of PBX combines the features of both software and traditional hardware?
What is the role of a firewall in a network?
What is the role of a firewall in a network?
In asymmetric encryption, who possesses the private key?
In asymmetric encryption, who possesses the private key?
What is the primary function of a protocol analyzer?
What is the primary function of a protocol analyzer?
Which of the following is NOT a characteristic of a Fiber Channel protocol?
Which of the following is NOT a characteristic of a Fiber Channel protocol?
What distinguishes a private cloud from a public cloud?
What distinguishes a private cloud from a public cloud?
What is the role of the public key in asymmetric encryption?
What is the role of the public key in asymmetric encryption?
What does a proxy server primarily do?
What does a proxy server primarily do?
Which statement best describes public switched telephone network (PSTN)?
Which statement best describes public switched telephone network (PSTN)?
What is the primary purpose of VoIP technology?
What is the primary purpose of VoIP technology?
Which term describes a security breach that can be triggered accidentally or exploited intentionally?
Which term describes a security breach that can be triggered accidentally or exploited intentionally?
What is a warm site in the context of disaster recovery?
What is a warm site in the context of disaster recovery?
What does WPA stand for in relation to Wi-Fi security?
What does WPA stand for in relation to Wi-Fi security?
What role does a Wi-Fi analyzer play in wireless networking?
What role does a Wi-Fi analyzer play in wireless networking?
What does a wire map tester verify?
What does a wire map tester verify?
What is the purpose of a wiring diagram?
What is the purpose of a wiring diagram?
What does WMN stand for in wireless networking?
What does WMN stand for in wireless networking?
What does RDP primarily allow a user to do?
What does RDP primarily allow a user to do?
Which TCP port does RDP use?
Which TCP port does RDP use?
What defines the private address ranges according to RFC 1918?
What defines the private address ranges according to RFC 1918?
What does a rogue access point refer to in networking?
What does a rogue access point refer to in networking?
How does the role-based access control (RBAC) model manage user permissions?
How does the role-based access control (RBAC) model manage user permissions?
What is the main purpose of resource records in DNS?
What is the main purpose of resource records in DNS?
Which of the following best describes a router?
Which of the following best describes a router?
What is the purpose of IP address reservation in DHCP?
What is the purpose of IP address reservation in DHCP?
Flashcards
fiber distribution panel
fiber distribution panel
Type of distribution frame with pre-wired connectors used with fiber optic cabling.
fiber optic cable
fiber optic cable
Network cable type that uses light signals as the basis for data transmission. Infrared light pulses are transmitted down the glass core of the fiber. The cladding that surrounds this core reflects light back to ensure transmission efficiency. At the receiving end of the cable, light-sensitive diodes re-convert the light pulse into an electrical signal. Fiber optic cable is immune to eavesdropping and EMI, has low attenuation, supports rates of 10 Gb/s+, and is light and compact.
fibre channel
fibre channel
High-speed network communications protocol used to implement SANs.
firewall
firewall
Signup and view all the flashcards
first hop redundancy protocols (FHRPs)
first hop redundancy protocols (FHRPs)
Signup and view all the flashcards
fragmentation
fragmentation
Signup and view all the flashcards
frame
frame
Signup and view all the flashcards
general data protection regulation (GDPR)
general data protection regulation (GDPR)
Signup and view all the flashcards
NetFlow
NetFlow
Signup and view all the flashcards
Network Address Translation (NAT)
Network Address Translation (NAT)
Signup and view all the flashcards
Network Attached Storage (NAS)
Network Attached Storage (NAS)
Signup and view all the flashcards
Network Adapter
Network Adapter
Signup and view all the flashcards
NAT64
NAT64
Signup and view all the flashcards
Network Layer (Layer 3)
Network Layer (Layer 3)
Signup and view all the flashcards
Multiuser MIMO (MU-MIMO)
Multiuser MIMO (MU-MIMO)
Signup and view all the flashcards
Network Access Control (NAC)
Network Access Control (NAC)
Signup and view all the flashcards
WPA/WPA2-PSK
WPA/WPA2-PSK
Signup and view all the flashcards
Private Cloud
Private Cloud
Signup and view all the flashcards
PBX (Private Branch Exchange)
PBX (Private Branch Exchange)
Signup and view all the flashcards
Asymmetric Encryption (Private Key)
Asymmetric Encryption (Private Key)
Signup and view all the flashcards
Production Configuration
Production Configuration
Signup and view all the flashcards
Protocol Analyzer (Packet Analyzer)
Protocol Analyzer (Packet Analyzer)
Signup and view all the flashcards
Proxy Server
Proxy Server
Signup and view all the flashcards
Public Cloud
Public Cloud
Signup and view all the flashcards
Remote Authentication
Remote Authentication
Signup and view all the flashcards
Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP)
Signup and view all the flashcards
Repeater
Repeater
Signup and view all the flashcards
Reservation
Reservation
Signup and view all the flashcards
Resource Records
Resource Records
Signup and view all the flashcards
Reverse DNS
Reverse DNS
Signup and view all the flashcards
RFC 1918
RFC 1918
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Security Assertion
Security Assertion
Signup and view all the flashcards
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
Signup and view all the flashcards
Security Service Edge (SSE)
Security Service Edge (SSE)
Signup and view all the flashcards
Self-Signed Certificate
Self-Signed Certificate
Signup and view all the flashcards
Server Message Block (SMB)
Server Message Block (SMB)
Signup and view all the flashcards
Service Level Agreement (SLA)
Service Level Agreement (SLA)
Signup and view all the flashcards
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP)
Signup and view all the flashcards
Session Layer (Layer 5)
Session Layer (Layer 5)
Signup and view all the flashcards
Voice over IP (VoIP)
Voice over IP (VoIP)
Signup and view all the flashcards
VoIP phone
VoIP phone
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Vulnerability Assessment
Vulnerability Assessment
Signup and view all the flashcards
Warm site
Warm site
Signup and view all the flashcards
Wide area network (WAN)
Wide area network (WAN)
Signup and view all the flashcards
Wi-Fi Analyzer
Wi-Fi Analyzer
Signup and view all the flashcards
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language)
Signup and view all the flashcards
Study Notes
IEEE Standards
- IEEE standards specify wireless networking using spread spectrum radio transmission in 2.4 GHz and 5 GHz bands. Wi-Fi has iterations: a, b, g, Wi-Fi 4 (n), Wi-Fi 5 (ac), and Wi-Fi 6 (ax).
- The iterations standardize modulation techniques, distances, data rates, and features like channel bonding, MIMO, and MU-MIMO.
- 802.11h amendment defines Dynamic Frequency Selection (DFS) to prevent interference with radar and cellular communications in the 5 GHz band.
802.1 Standards
- 802.1p defines a 3-bit class of service priority field in 802.1Q format.
- 802.1q is a protocol for trunking, enabling switches to exchange data about VLAN configurations. It is used to tag frames for different VLANs across trunk links.
- 802.1x is for port-based authentication, also known as port-based network access control.
Ethernet Standards
- 802.3 standards detail media types, access methods, data rates, and distance limitations at OSI layers 1 and 2, using xBASE-y designations.
Access Control
- Access control lists (ACLs) determine access privileges (read-only, read/write) to objects.
- Access points (APs) connect wireless devices to wired networks and implement Infrastructure WLAN.
- Access/edge layers are the lowest hierarchical configuration used as the attachment point for end systems.
- Active-active cluster configuration utilizes all nodes continually.
- Active-passive cluster utilizes one or more nodes only during failover for high availability.
- Ad hoc networks allow connected devices to communicate directly without established mediums and are also called Independent Basic Service Sets (IBSS).
Additional Addressing and Protocols
- Address Resolution Protocol (ARP) matches hardware MAC addresses to local IP addresses.
- Addressing includes MAC, IPv4, and IPv6.
- Adjacent Channel Interference (ACI) occurs when access points are configured on overlapping channels.
- Administrative Distance (AD) measures the trustworthiness of routing protocols.
- Advanced Persistent Threats (APTs) have the ability to obtain, maintain, and diversify unauthorized access to systems over long periods.
- Angled physical contact (APC) is an optic connector type using an angled polish for the ferrule.
- Antenna types are omnidirectional and unidirectional, commonly used for wireless signals.
- Anycast is an IP delivery method where a packet is addressed to a single host from a group.
- Layer 7, or application layer, is responsible for network services like file transfer, printing, email, databases and more.
- Application Programming Interfaces (APIs) provide interactions between scripts or apps and a program or a web app.
- ARP command displays/modifies IP-MAC address mappings in host's cache.
- ARP spoofing is a network attack that redirects an IP address to a wrong MAC address.
- Attenuation measures a signal's decrease in strength as it travels through a medium.
- Authentication Header (AH) assures data origin, integrity, and protection against replay attacks in IPSec protocol.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.