Ch. 13-20 Flashcards Preview

Networking IT 2400 > Ch. 13-20 > Flashcards

Flashcards in Ch. 13-20 Deck (145)
Loading flashcards...
1
Q

Multiplexer

A

Takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire.

2
Q

FDM

A

Frequency Division Multiplexing - process of keeping every separate call in its own unique frequency range.

3
Q

Circuit Switching

A

Physically connecting two phones together on one circuit.

4
Q

A repeater

A

Takes the entire digital signal and re-creates it out the other end.

5
Q

Last Mile

A

The connection from a central office to individual users.

6
Q

DS0

A

Digital Signal Rate - Converts analog sound into 8-bit chunks 8000 times a second creating a data stream.

7
Q

Modem

A

A modulator takes a digital signal and converts it into an analog signal. A demodulator takes an analog signal and converts it into a digital signal. A modem does both.

8
Q

T1 connection

A

A high-speed digital networking technology.

9
Q

T1 Line

A

The specific, shielded, two-pair cabling that connects the two ends of a T1 connection.

10
Q

CSU/DSU

A

Channel Service Unit/Digital Service Unit

11
Q

DS1

A

Digital Signal 1 - A special signaling method. Uses a relatively primitive frame.

12
Q

TDM

A

Time Division Multiplexing - The process of having frames that carry a portion of every channel in every frame on a regular interval.

13
Q

T3 Line

A

Supports a data rate of about 4 Mbps on a dedicated telephone connection.

14
Q

T1

A

24 channels, 1.544 Mbps

15
Q

T3

A

672 channels, 44.736 Mbps

16
Q

E1

A

32 channels, 2.048 Mbps

17
Q

E3

A

512 channels, 34.368 Mbps

18
Q

SONET

A

Synchronous Optical Network

19
Q

SDH

A

Synchronous Digital Hierarchy

20
Q

OC

A

Optical Carrier - standards denote the optical data-carrying capacity (in bps) of fiber-optic cables in networks conforming to the SONET standard.

21
Q

WDM

A

Wavelength Division Multiplexing - enables an individual single-mode fiber to carry multiple signals by giving each signal a different wavelength.

22
Q

DWDM

A

Dense Wavelength Division Multiplexing

23
Q

STS

A

Synchronous Transport Signal - Consists of two parts: STS Payload and STS Overhead.

24
Q

STS Payload

A

Carries data

25
Q

STS Overhead

A

Carries the signaling and protocol information.

26
Q

Packet Switches

A

Machines that forward and store packets using any type of packet switching protocol.

27
Q

Frame Relay

A

An extremely efficient packet-switching standard, designed for and used primarily with T-carriers. Switches packets quickly, but without any guarantee of data integrity at all.

28
Q

ATM

A

Asynchronous Transfer Mode - A network technology originally used for high-speed LAN’s. Integrated voice, video, and data on one connection, using short and fixed-length packets called cells to transfer information.

29
Q

MPLS

A

Multiprotocol Label Switching - Adds an MPLS label that sits between the Layer 2 and Layer 3 information. Layer 3 is always IP, so MPLS labels sit between Layer 2 and the IP headers. Consists of four parts: Label, Cost of Service (CoS), S, Time to Live (TTL).

30
Q

QoS

A

Quality of Service

31
Q

FEC

A

Forwarding Equivalence Class - A group of devices that tend to send packets to the same place, such as a single broadcast domain of computers connected to a router.

32
Q

LSR

A

Label Switching Router - Looks for and forwards packets based on their MPLS label.

33
Q

LER

A

Label Edge Router - An MPLS router that has the job of adding MPLS labels to incoming packets that do not yet have a label.

34
Q

LDP

A

Label Distribution Protocol - LSR’s and LER’s use the LDP to communicate dynamic information about their state.

35
Q

BERT

A

Bit Error Rate Test - Verifies the T-connection from end to end.

36
Q

Dedicated Lines

A

Are always off the hook, they never hang up on each other.

37
Q

Dial-up Lines

A

Have phone numbers, must dial up to make connection.

38
Q

PSTN

A

Public Switched Telephone Network - POTS (plain old telephone service). Regular phone line.

39
Q

LEC

A

Local Exchange Carrier - The telephone company (telco) that provides local connections and usually the one that owns your local central office.

40
Q

IXC

A

Interexchange Carrier - provides long distance

41
Q

Baud

A

One analog cycle on a telephone line.

42
Q

Baud Rate

A

The number of bauds per second.

43
Q

NIU

A

Network Interface Unit - The small box on the side of a home that accepts the incoming lines from the telephone company and then splits connections used in businesses.

44
Q

UART

A

Universal Asynchronous Receiver/Transmitter - Takes the 8-bit-wide digital data and converts it into 1-bit-wide digital data and hands it to the modem for conversion to analog. This process is reversed for incoming data.

45
Q

CCITT

A

International Telegraph and Telephone Consultative Committee now known as ITU (International Telecommunication Union)

46
Q

V Standards

A

Define the speeds at which modems can modulate. V.92 Standard is the current standard.

47
Q

V.42

A

Error Checking

48
Q

V.42bis

A

Data compression

49
Q

V.44

A

Data compression

50
Q

MNP5

A

Both error checking and data compression

51
Q

ISDN

A

Integrated Services Digital Network - process of sending telephone transmission across fully digital lines end-to-end.

52
Q

B Channels

A

Bearer Channels - carry data and voice information using standard DS0 channels.

53
Q

D Channels

A

Delta Channels - Carry setup and configuration information at 16 Kbps.

54
Q

BRI

A

Basic Rate Interface - Most common setup is two B/one D. Setup uses only one physical line, but each B channel sends 64 Kbps, doubling the throughput total to 128 Kbps.

55
Q

PRI

A

Primary Rate Interface - Type of ISDN, A full T1 line, carrying 23 B channels.

56
Q

TA

A

Terminal Adapter

57
Q

SPID

A

Service Profile ID

58
Q

DSL

A

Digital Subscriber Line - A fully digital, dedicated connection.

59
Q

SDSL

A

Symmetric DSL - Expensive, equal upload and download speed

60
Q

ADSL

A

Asymmetric DSL - less expensive

61
Q

VDSL

A

Very High Bitrate DSL - most expensive

62
Q

SOHO

A

Small Office and Home Office

63
Q

DSLAM

A

DSL Access Multiplexer - connects multiple customers to the internet.

64
Q

PPPoE

A

Point-to-Point Protocol over Ethernet

65
Q

DOCSIS

A

Data Over Cable Service Interface Specification

66
Q

802.16

A

Wireless Standard - WIMAX

67
Q

MANs

A

Metropolitan Area Networks

68
Q

LTE

A

Long Term Evolution

69
Q

HSPA

A

High-Speed Packet Access - 3G, HSPA+ is 4G

70
Q

PON

A

Passive Optical Network - uses single fiber to the neighborhood switch and then individual fiber runs to each final destination.

71
Q

BPL

A

Broadband over Power Line

72
Q

PLC

A

Powerline Communications

73
Q

Remote Access

A

Uses WAN and LAN connections to enable a computer user to log onto a network from the other side of a city, a state, or even the globe.

74
Q

Dial-up to the Internet

A

Using a dial-up connection to your ISP

75
Q

Private dial-up

A

Using a dial-up connection to your private network.

76
Q

Virtual Private Network

A

Using an Internet connection to connect to a private network

77
Q

Dedicated Connection

A

Using a non-dial-up connection to another private network or the Internet.

78
Q

Remote Terminal

A

Using a terminal emulation program to connect to another computer

79
Q

VoIP

A

Voice over Internet

80
Q

RAS

A

Remote Access Server

81
Q

Remote Terminal

A

A Connection on a faraway computer that enables you to control that computer as if you were sitting in front of it, logged in.

82
Q

ICA

A

Independent Computer Architecture

83
Q

RDP

A

Remote Desktop Protocol

84
Q

RDC

A

Remote Desktop Connection

85
Q

RTP

A

Real-Time Transport Protocol

86
Q

SIP

A

Session Initiation Protocol

87
Q

H.323

A

A VoIP standard that handles the initiation, setup, and delivery of VoIP sessions.

88
Q

Worldwide, most voice and data SONET rings use this cell-based packet switching standard.

A

ATM

89
Q

Which of the following is NOT a version of DSL service?

A

DDSL

90
Q

Which of the following is the DSL device that is located in a central office, connecting multiple DSL customers to the Internet?

A

DSLAM

91
Q

What is the maximum distance between a user’s demarc and the central office for all versions of DSL?

A

18,000 feet

92
Q

A common standard for VOIP is RTP.

A

True

93
Q

DSSS

A

Direct Sequence Spread Spectrum

94
Q

FHSS

A

Frequency Hopping Spread Spectrum

95
Q

OFDM

A

Orthogonal Frequency Division Multiplexing

96
Q

802.11

A

Wireless Standard

97
Q

WAP

A

Wireless Access Point

98
Q

Ad hoc mode

A

A wireless networking mode where each nodes in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology.

99
Q

Infrastructure Mode

A

Mode in which wireless networks use one or more wireless access points to connect the wireless network nodes centrally. This configuration is similar to the star topology of a wired network.

100
Q

CSMA/CD

A

Carrier Sense Multiple Access with Collision Detection

101
Q

CSMA/CA

A

Carrier Sense Multiple Access with Collision Avoidance

102
Q

POE

A

Power Over Ethernet

103
Q

Network Threat

A

Any number of things that share one essential feature: the potential to damage network data, machines, or users.

104
Q

NAC

A

Network Access Control

105
Q

Fault Tolerance

A

The capability of any system to continue functioning after soem part of the system has failed. RAID is an example of a hardware device that provides fault tolerance for hard drives.

106
Q

Malware

A

Any program or code (macro, script, and so on) that’s designed to do something on a system or network that you don’t want to have happen.

107
Q

Virus

A

A program that can make a copy of itself without you necessarily being aware of it. Some viruses can destroy or damage files, and generally the best protection is always to maintain backups of your files.

108
Q

Worm

A

A very special form of virus. Unlike other viruses, a worm does not infect other files on the computer. Instead, it replicates by making copies of itself on other systems on a network by taking advantage of security weaknesses in networking protocols.

109
Q

Macro

A

A specially written application macro (collection of commands) that performs the same functions as a virus. These macros normally autostart when the application is run and then make copies of themselves, often propagating across networks.

110
Q

Trojan

A

A virus that masquerades as a file with a legitimate purpose, so that a user will run it intentionally. The classic example is a file that runs a game, but also causes some type of damage to the player’s system.

111
Q

Rootkit

A

A Trojan that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.

112
Q

Adware

A

A program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows.

113
Q

Spyware

A

Any program that sends information about your system or your actions over the internet.

114
Q

Social Engineering

A

The process of using or manipulating people inside the networking environment to gain access to that network from the outside.

115
Q

Phishing

A

The attacker poses as some sort of trusted site, like an online version of your bank or credit card company, and solicits you to update your financial information, such as a credit card number.

116
Q

Man in the Middle

A

A person inserts him into a conversation between two others, covertly intercepting traffic thought to be only between those other people.

117
Q

DoS

A

Denial of Service attacks are the work of hackers whose only interest is in bringing a network to its knees by flooding the network with so manny requests that it becomes overwhelmed and ceses functioning.

118
Q

Smurf Attack

A

When an attacker floods a network with ping packets sent to the broadcast address. The return address of the pings is spoofed to that of the intended victim.

119
Q

DDoS

A

Distributed Denial of Service Attacks - Uses multiple computers under the control of a single operator to launch a devastating attack.

120
Q

Zombie

A

A single computer under the control of an operator.

121
Q

Botnet

A

A group of computers under the control of one operator.

122
Q

Leeching

A

Using another person’s wireless network without that person’s permission.

123
Q

Rogue Access Point

A

An unauthorized acces point (WAP) installed in a computer network.

124
Q

Evil Twin

A

An attack that lures people into logging into a rogue access point that looks similar to a legitimate access point.

125
Q

Internal Threats

A

All the things that a network’s own users do to create problems on the network. Examples include accidental deletion of files, accidental damage to hardware devices or cabling, and abuse of rights and permissions.

126
Q

Authentication

A

A person can prove their identity.

127
Q

Multifactor Authentication

A

A form of authentication where a user must use two or more factors to prove their identity.

128
Q

Knowledge Factor

A

Something the user knows, like a password or personal identification number (PIN).

129
Q

Ownership Factor

A

Something the user has, like an ID card or security token.

130
Q

Inherent Factor

A

Something that is part of the user, like a fingerprint or retinal scan.

131
Q

Two-factor Authentication

A

Typically some sort of physical token that, when inserted, prompts for a password. Using what she has and knows.

132
Q

Passwords

A

A series of characters that enables a user to gain access to a file, a folder, a PC or program.

133
Q

Smart Devices

A

Devices such as credit cards, USB keys, etc. that you insert into your PC in lieu of entering a password.

134
Q

Biometric Devices

A

Devices that scan fingerprints, retinas, or even the sound of the user’s voice to provide a foolproof replacement for both passwords and smart devices.

135
Q

Principle of Least Privilege

A

The control over what a legitimate account can do.

136
Q

External Threats

A

Threats to your network through external means; examples include virus attacks and the exploitation of users, security holes in the OS, or the network hardware itself.

137
Q

NAT

A

Network Address Translation

138
Q

Port Filtering/Port Blocking

A

Preventing the passage of any TCP or UDP segments or datagrams through any ports other than the ones prescribed by the system administrator.

139
Q

Stateless Filtering

A

.

140
Q

Stateful filtering or Stateful inspection

A

.

141
Q

MAC Filtering

A

.

142
Q

Honeypot

A

A device (or set of functions within a firewall) that creates a fake network called a honeynet.

143
Q

DMZ

A

Demilitarized Zone - A lightly protected network positioned between your firewall and the internet.

144
Q

Intranet

A

A private, protected network.

145
Q

NMAP

A

A utility program that scans a network to determine things like open ports, passive applications, and more.