• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back

802.1X

A port-authentication network access control mechanism for networks.

802.11a

A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 54 Mbps.

802.11a-ht 

802.11a-ht, and the corresponding 802.11g-ht standard, are technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported.

802.11b

The first popular wireless standard, operates in the frequency range of 2.4 GHz and offers throughput of up to 11 Mbps.

802.11g 

Currently (2015) the wireless standard with the widest use, operates on the 2.4-GHz band with a maximum throughput of 54 Mbps.

802.11g-ht

802.11g-ht, and the corresponding 802.11a-ht standard, are technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported.

802.11i 

A wireless standard that added security features.

802.11n

An updated 802.11 standard that increases transfer speeds and adds support for multiple in/multiple out (MIMO) by using multiple antennas. Can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps.

ad hoc mode 

A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Is similar to the mesh topology.

Advanced Encryption Standard (AES)

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.

bandwidth saturation

When the frequency of a band is filled to capacity due to the large number of devices using the same bandwidth.

Basic Service Set

In wireless networking, a single access point servicing a given area.

Bounce

A signal sent by one device taking many different paths to get to the receiving systems.

bring your own device (BYOD) 

A trend wherein users bring their own network-enabled devices to the work environment. These cell phones, tablets, notebooks, and other mobile devices must be easily and securely integrated and released from corporate network environments using on-boarding and off-boarding technologies.

carrier sense multiple access with collision avoidance (CSMA/CA) 

Access method used mainly on wireless networks. Before hosts send out data, they send out a signal that checks to make sure the network is free of other signals. If data is detected on the wire, the hosts wait a random time period before trying again. If the wire is free, the data is sent out.

dipole antenna

The standard straight-wire antenna that provides most omnidirectional function.

link state

Type of dynamic routing protocol that announces only changes to routing tables, as opposed to entire routing tables. Compare to distance vector routing protocols.

point-to-point

Network topology in which two computers are directly connected to each other without any other intervening connection components such as hubs or switches.

point-to-multipoint 

Topology in which one device communicates with more than one other device on a network.

site survey

A process that enables you to determine any obstacles to creating the wireless network you want.

thick client

A wireless access point that is completely self-contained with a full set of management programs and administrative access ways. Each client is individually managed by an administrator who logs into the WAP, configures it, and logs out.

thin client

A wireless access point with minimal configuration tools installed. Instead, it is managed by a central controller. An administrator can manage a large number of thin clients by logging into the central controller and performing management tasks on any thin client routers from there.

unidirectional antenna

focus all of their transmission energy in a single, relatively narrow direction. Similarly, their design limits their ability to receive signals that are not aligned with the focused direction.

VLAN Pooling

Used in wireless networking, a setup where multiple VLANs share a common domain. The multiple VLANs are used to keep broadcast traffic to manageable levels. Wireless clients are randomly assigned to different VLANs. Their common domain enables them all to be centrally managed.

wireless bridge

Device used to connect two wireless network segments together, or to join wireless and wired networks together in the same way that wired bridge devices do.

wireless controller

Central controlling device for thin client WAPs.

Out-of-band management

The process of managing a network device via a connection other than the regular network link used by the device to send and receive network traffic

Bluesnarfing

The practice of gaining unauthorized access to a Bluetooth device

Bluejacking

The practice of sending unsolicited messages over Bluetooth

TEMPEST

protects against unintentional signal leakage and eavesdropping

(UTM) Unified Threat Management

a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection

Virtual Wire

solution that allows for creating logical binding between two ports and passing all traffic between them without any switching or routing

eDiscovery

the process of searching, collecting, and securing electronic data with the intent of using it in a legal proceeding or investigation

ping host1 -6

syntax for checking the IPv6 connectivity with another network node (host1) in MS Windows

ping6 host1

command-line commands listed below allows for sending an ICMPv6 echo request to another network node (host1) in Linux OS

NIC teaming

The process of combining multiple physical network adapters into a single logical interface

(AUP)Acceptable Use Policy

A set of rules enforced in a network that restrict the use to which the network may be put

(SLA) Service Level Agreement

An agreement between a service provider and the user(s) defining the nature, availability, quality, and scope of the service to be provided

(MOU) Memorandum Of Understanding

A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission

(MSA) Master Service Agreement

A type of agreement that specifies generic terms in order to simplify the negotiation of future contracts between the signing parties

(SOW) Statement Of Work

a document that defines the specific requirements of a project or service contract

Intermediate Distribution Frame (IDF)

A type of wiring closet that interconnects WAN links coming into the building with the internal network