Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
In order to connect to WLANs that are faster than 54 Gbps, you would need to utilize the _________ standard.
|
WPA2
|
|
A ________________ is when two or more wireless clients communicate directly with each other, without the need for a WAP.
|
ad-hoc network
|
|
The manager of IT asks you to connect a computer to an RJ45 jack. You should use a __________ cable to do so.
|
straight through
|
|
You are in charge of installing 200 twisted-pair cable drops. What wiring standard should you most likely use?
|
568B
|
|
What is the maximum speed supported by 802.11g?
|
54 Mbps
|
|
these cables have Teflon coating that makes them more impervious to fire.
|
Plenum-Rated
|
|
You need to connect 802.11a, 802.11b, and 802.11n wireless networks together. What wireless tool will guarantee you connectivity between these networks?
|
Wireless bridge
|
|
You are making a specialized wired connection for a server that will operate on an Ethernet network. Which two wiring colors should you use?
|
Orange and green
|
|
The IT director has asked you to connect three new super computers to the backbone of a network that runs at 1 Gbps. What type of cable will be sufficient for this task?
|
Category 5e
|
|
A twisted-pair cable was run 140 meters without any repeaters. Now, the signal cannot be picked up by the destination host. This cable is the victim of ____________.
|
attenuation
|
|
You need to connect a desktop computer to a WLAN using the strongest encryption type possible
The ____________ wireless encryption mode can be as strong as 256-bit. |
WPA2
|
|
An interim encryption protocol used with wireless networks; replaced WEP.
|
Wi-Fi Protected Access (WPA)
|
|
You are in charge of installing 200 twisted-pair cable drops. What wiring standard should you most likely use?
|
568B
|
|
Your boss wants you to connect two of his laptops directly to each other using their network adapters. What kind of cable should you use?
|
Crossover cable
|
|
The type of cable known as ___________ cable will protect the copper wires inside the cable from EMI.
|
shielded twisted pair
|
|
A form of cross talk interference, measured at the cable end farthest from the transmitter.
|
far end crosstalk
|
|
(A type of port that includes a crossover connection.)
instead of using crossover cables to connect computers to central connecting devices such as switches, these central connecting devices are equipped with _______ ports, which take care of the cross. |
MDI-X
|
|
A wireless encryption protocol used with WPA2.
|
Advanced Encryption Standard (AES)
|
|
An electromagnetic (EM) field that is generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.
|
data emanation
|
|
What is the most common copper-based cable used today?
|
twisted pair
|
|
A form of cross talk that is measured interference between two pairs in a single cable, measured on the cable end nearest the transmitter.
|
near end crosstalk
|
|
A method in which a wireless bridge is used to connect different 802.11 standards.
|
bridge mode
|
|
Gigabit networks. Has different versions that run at 250 MHz and 500 MHz.
|
Category 6 Cable Type
|
|
has eight wires; they are copper conductors that transmit electric signals. These eight wires are grouped into four pairs: blue, orange, green, and brown.
|
Twisted Pair Cables
|
|
Multi-mode fiber (The Medium) - Half duplex: 400 meters; full duplex: 2 km
Single-mode fiber (The Medium) - Full duplex: 10km |
100Base-FX
|
|
100 Mbps and Gigabit networks and is usually rated at 350 MHz, but actual speed varies depending on several different networking factors.
|
Category 5e Cable Type
|
|
Your boss doesn’t know exactly how to do it, but he knows that he wants port-based authentication for his network. He is searching for a ______ implementation.
For organizations, using, authentication for wireless networks is recommended. A port-based network access control used to secure wireless connection |
802.1x
|
|
When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?
|
Radio Frequency Interference (RFI)
|
|
a network composed of at least one WAP and at least one computer or handheld device that can connect to the WAP.
|
Wireless LAN (WLAN)
|
|
allow for connectivity between a desktop computer or laptop and the wireless access point.
|
Wireless Network Adapters
|
|
This means that wireless devices can have more antennas, up to four maximum.
|
Multiple-Input Multiple Output (MIMO)
|
|
128-bit encryption level
A type of wireless encryption used with WPA. |
Temporal Key Integrity Protocol (TKIP)
|
|
A cable with an optical fiber that is meant to carry a single ray of light-one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km and up to 80 km
|
Single-mode (SM)
|
|
Occurs when wireless clients connect to and are authenticated by a wireless access point, which can be expanded by creating a wireless distribution system-a group of WAPs interconnected wirelessly.
|
Infrastructure Mode
|
|
What characteristic of a cable prevents crosstalk?
|
twists per foot
|
|
Two channels that do not overlap are used together in an effort to double the physical data rate.
|
channel bonding
|