• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
In order to connect to WLANs that are faster than 54 Gbps, you would need to utilize the _________ standard.
WPA2
A ________________ is when two or more wireless clients communicate directly with each other, without the need for a WAP.
ad-hoc network
The manager of IT asks you to connect a computer to an RJ45 jack. You should use a __________ cable to do so.
straight through
You are in charge of installing 200 twisted-pair cable drops. What wiring standard should you most likely use?
568B
What is the maximum speed supported by 802.11g?
54 Mbps
these cables have Teflon coating that makes them more impervious to fire.
Plenum-Rated
You need to connect 802.11a, 802.11b, and 802.11n wireless networks together. What wireless tool will guarantee you connectivity between these networks?
Wireless bridge
You are making a specialized wired connection for a server that will operate on an Ethernet network. Which two wiring colors should you use?
Orange and green
The IT director has asked you to connect three new super computers to the backbone of a network that runs at 1 Gbps. What type of cable will be sufficient for this task?
Category 5e
A twisted-pair cable was run 140 meters without any repeaters. Now, the signal cannot be picked up by the destination host. This cable is the victim of ____________.
attenuation
You need to connect a desktop computer to a WLAN using the strongest encryption type possible
The ____________ wireless encryption mode can be as strong as 256-bit.
WPA2
An interim encryption protocol used with wireless networks; replaced WEP.
Wi-Fi Protected Access (WPA)
You are in charge of installing 200 twisted-pair cable drops. What wiring standard should you most likely use?
568B
Your boss wants you to connect two of his laptops directly to each other using their network adapters. What kind of cable should you use?
Crossover cable
The type of cable known as ___________ cable will protect the copper wires inside the cable from EMI.
shielded twisted pair
A form of cross talk interference, measured at the cable end farthest from the transmitter.
far end crosstalk
(A type of port that includes a crossover connection.)
instead of using crossover cables to connect computers to central connecting devices such as switches, these central connecting devices are equipped with _______ ports, which take care of the cross.
MDI-X
A wireless encryption protocol used with WPA2.
Advanced Encryption Standard (AES)
An electromagnetic (EM) field that is generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.
data emanation
What is the most common copper-based cable used today?
twisted pair
A form of cross talk that is measured interference between two pairs in a single cable, measured on the cable end nearest the transmitter.
near end crosstalk
A method in which a wireless bridge is used to connect different 802.11 standards.
bridge mode
Gigabit networks. Has different versions that run at 250 MHz and 500 MHz.
Category 6 Cable Type
has eight wires; they are copper conductors that transmit electric signals. These eight wires are grouped into four pairs: blue, orange, green, and brown.
Twisted Pair Cables
Multi-mode fiber (The Medium) - Half duplex: 400 meters; full duplex: 2 km
Single-mode fiber (The Medium) - Full duplex: 10km
100Base-FX
100 Mbps and Gigabit networks and is usually rated at 350 MHz, but actual speed varies depending on several different networking factors.
Category 5e Cable Type
Your boss doesn’t know exactly how to do it, but he knows that he wants port-based authentication for his network. He is searching for a ______ implementation.
For organizations, using, authentication for wireless networks is recommended. A port-based network access control used to secure wireless connection
802.1x
When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?
Radio Frequency Interference (RFI)
a network composed of at least one WAP and at least one computer or handheld device that can connect to the WAP.
Wireless LAN (WLAN)
allow for connectivity between a desktop computer or laptop and the wireless access point.
Wireless Network Adapters
This means that wireless devices can have more antennas, up to four maximum.
Multiple-Input Multiple Output (MIMO)
128-bit encryption level
A type of wireless encryption used with WPA.
Temporal Key Integrity Protocol (TKIP)
A cable with an optical fiber that is meant to carry a single ray of light-one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km and up to 80 km
Single-mode (SM)
Occurs when wireless clients connect to and are authenticated by a wireless access point, which can be expanded by creating a wireless distribution system-a group of WAPs interconnected wirelessly.
Infrastructure Mode
What characteristic of a cable prevents crosstalk?
twists per foot
Two channels that do not overlap are used together in an effort to double the physical data rate.
channel bonding