• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
Connects all segments to a network
expands broadcast domain
expands collision domain
star topology
Hub
extends network beyond recommended segment length
repeater
modulate/demodulate
traditional
DSL
cable
modem
allows a nic or other networking device to connect to a different type of media then it was designed for.
transceiver
switches on layer 2 for switch functions but can also operate on higher layers for routing functions.
handles packet switching with ASIC hardware
Multilayer Switch
load balancing servers
encryption
decryption
administration of digital certificate.
Content Switch
detects tactics used to exploit your system and report them.
monitors for suspicious and malicious tactics and takes action to prevent them.
IPS/IDS
(Intrusion Prevention/Intrusion Dection System)
sends incoming packets to multiple machines hidden behind one IP address.
Allow for redundancy and scalability
Load Balancer
'A' Records
Point records
Mail Exchange Records (MX)
CNAME or Alias Records
DNS server
controls computer network traffic and delays specified packets to lower response time and maximize network availability.
Bandwith Shaper
speeds up a network service request by recovering information from a clients earlier request.
Caching proxy server
used to create a web cache
web proxy server
Used between a demarc poing and the router to give access to a providers digital network.
CSU / DSU
Channel service unit/ Data service unit
Will not forward any broadcast or multicast packets
use logical address to determine the next hop
uses access lists to control security
provides connections between VLANS
provides QOS
Routers