NETWORK+ Terms Numbers and A's Flashcards Preview

NETWORK+ Terms > NETWORK+ Terms Numbers and A's > Flashcards

Flashcards in NETWORK+ Terms Numbers and A's Deck (47)
Loading flashcards...
1
Q
An IEEE 802.3 specification
for Ethernet at 10Mbps over
thin coaxial cable. The maximum
length of a \_\_\_\_\_\_ segment is 185
meters (607 feet). It operates
at 10Mbps and uses a baseband
transmission method.
A

10Base2

2
Q
The IEEE 802.3 specification
for 10Mbps Ethernet using
thick coaxial cable. The maximum
length of a \_\_\_\_\_ segment is 500
meters (1,640 feet).
A

10Base5

3
Q

The IEEE 802.3 specification
for running Ethernet at
10Mbps over fiber-optic cable. The
maximum length of a _____ segment is 2,000 meters

A

10BaseFL

4
Q

The IEEE 802.3i specification
for running Ethernet at
10Mbps over twisted-pair cabling.
The maximum length of a _____segment is 100 meters (328 feet).

A

10BaseT

5
Q

A 10Gbps Ethernet
networking standard that can be
used up to 40,000 meters.

A

10GbaseER

6
Q
Both the types of this Gigabit standards deploy with extralong-
wavelength single-mode fiber.
This medium provides transmission
distances ranging from 2 meters to
40 kilometers. 10GbaseER deploys
over dark fiber, but the \_\_\_\_\_\_ standard
is used primarily with SONET
equipment.
A

10GbaseEW

7
Q
A 10Gbps Ethernet
networking standard that can be
used up to 10,000 meters.
\_\_\_\_\_ uses single-mode fiberoptic
cabling.
A

10GbaseLR

8
Q
The IEEE 802.3 specification
for running Fast Ethernet
at 100Mbps over fiber-optic cable.
The maximum length of a
\_\_\_\_\_segment is 2,000 meters
(6,561 feet) in full-duplex mode.
A

100BaseFX

9
Q

The _____Ethernet standard is over singlemode fiber. Both the these standards are designed to be used over long-wavelength single-mode fiber, giving it a potential transmission range of anywhere from 2
meters to 10 kilometers. This
standard is designed to connect to
SONET equipment.

A

10GbaseLW

10
Q
The IEEE 802.3 specification
for running Ethernet at
100Mbps over twisted-pair cabling.
The maximum length of a
\_\_\_\_\_ segment is 100 meters
(328 feet).
A

100BaseT

11
Q

A 10Gbps Ethernet
networking standard that can be
used over relatively short distances,
up to 300 meters.

A

10GbaseSR

12
Q
An IEEE 802.3u specification,
also known as Fast
Ethernet, for running Ethernet at
100Mbps over STP or UTP. The
maximum length of a \_\_\_\_\_segment is 100 meters (328 feet).
A

100BaseTX

13
Q
Both of these are designed for deployment over shortwavelength multimode fiber. The
distance range for both classifications
ranges from as little as 2 meters to 300 meters. The difference between the two classifications
is that SR is designed for use over
dark fiber. The \_\_\_\_\_ standard
is designed for longer-distance
data communications and connects
to SONET equipment.
A

10GbaseSW

14
Q
An IEEE 802.3ab
standard that specifies Gigabit
Ethernet over Category 5 UTP
cable. The standard allows for fullduplex
transmission using four pairs
of twisted cable.
A

1000BaseT

15
Q

Telecommunications standards from the Telecommunications Industry Association (TIA) and the Electronics Industry Association (EIA). These ____ standards specify the pinaarrangements for the RJ-45 connectors on UTP or STP cables. The number refers to the order in which the wires within the UTP cable are terminated and attached to the connector.

A

568A/568B standards

16
Q

A term commonly used to refer to the 10Gbps Ethernet networking standards such as 10GbaseER, 10GbaseLR, and 10GbaseSR. _____is defined in the IEEE 802.3ae standard.

A

10GbE

17
Q

___ is the process to determine if someone
is authorized to use the network— if he can log on to the network. ___refers to identifying
the resources a user can access after he is authenticated. ___ refers to the tracking methods used to identify who uses the network
and what they do on the network.

A
Authentication, authorization,
and accounting (AAA)
18
Q

A n _____ _____has power supplied to it for the purposes of regenerating the signals that pass through it.

A

active hub

19
Q

Defines a wireless network layout whereby devices communicate directly between
themselves without using an access
point. Sometimes called an unmanaged
or peer-to-peer wireless topology.

A

ad hoc topology

20
Q
A transmitter and
receiver (transceiver) device commonly
used to facilitate communication
between a wireless client and a
wired network. \_\_\_ \_\_\_ are
used with the wireless infrastructure
network topology to provide a connection
point between WLANs and
a wired Ethernet LAN.
A

access point

21
Q

A set of numbers used to
identify and locate a resource or
device on a network. An example is as 192.168.2.1.

A

address

22
Q

A person responsible
for the control and security of
the user accounts, resources, and
data on a network.

A

administrator

23
Q
On a Windows system, the default
account that has rights to access
everything and to assign rights to
other users on the network. Unlike
other user accounts, the \_\_\_\_ account cannot be
deleted.
A

Administrator account

24
Q

The ____ message
sent between two hosts during
a TCP session.

A

ACK-acknowledgment

25
Q
The list
of trustees assigned to a file or
directory. A trustee can be any
object available to the security subsystem.
The term \_\_\_ \_\_\_ \_\_\_is also used
with routers and firewall systems to
refer to the list of permitted computers
or users.
A

ACL (access control list)

26
Q

A service that transmits digital voice and data over existing (analog) phone lines.

A

ADSL (Asymmetric Digital

Subscriber Line)

27
Q
Used in Windows
network environments, this is a
directory services system that
enables network objects to be stored
in a database. This database can
then be divided and distributed
among different servers on the network.
A

Active Directory

28
Q
An encryption algorithm
for securing sensitive networks
used by U.S. Government
agencies. Has become the encryption
standard for corporate networks.
A

AES (Advanced Encryption

Standard)

29
Q

One of the two separate protocols IPSec
consists of (the other being ESP).
___ provides the authentication and
integrity checking for data packets.

A

AH (Authentication Header)

30
Q

A log file on a Windows system that provides
information on events that occur
within an application.

A

application log

31
Q

One of the earliest forms of radio modulation,

this is a technique used in communication to transmit information over a radio wave.

A

AM (Amplitude Modulation)

32
Q
A flag that is set on a
file after it has been created or
altered. Some backup methods reset
the flag to indicate that it has been
backed up.
A

archive bit

33
Q

An organization that
publishes standards for communications,
programming languages, and
networking.

A

ANSI (American National Standards

Institute)

34
Q

The regional
Internet registry responsible for
managing both IPv4 and IPv6 IP
number distribution.

A

ARIN (American Registry for

Internet Numbers)

35
Q

A software application that detects and removes

virus programs.

A

antivirus software

36
Q
A protocol in the TCP/IP suite used
to resolve IP addresses to MAC
addresses. Specifically, the \_\_\_\_
command returns a Layer 2 address
for a Layer 3 address.
A

ARP (Address Resolution Protocol)

37
Q

A network device that offers connectivity
between wireless clients and (usually)
a wired portion of the network.

A

AP (wireless access point)

38
Q
The ARP utility that
resolves IP addresses to MAC
addresses. The ARP \_\_\_ utility
tests connectivity by pinging a MAC
address directly.
A

ARP ping

39
Q
A technology implemented
on certain Windows platforms
through which a system
assigns itself an IP address in the
absence of a DHCP server.
Addresses are assigned from the
169.254.x.x address range.
A

APIPA (Automatic Private IP

Addressing)

40
Q

A table of entries used
by ARP to store resolved ARP
requests. Entries can also be manually
stored.

A

ARP table

41
Q

Layer 7 of the
OSI model, which provides support
for end users and for application
programs using network resources

A

application layer

42
Q

A group of devices arranged
in a fault-tolerant configuration. See
also RAID.

A

array

43
Q
\_\_\_ \_\_\_ firewalls operate
at the application layer of the OSI
model. Application layer firewalls
can inspect data packets traveling to
or from an application.
A

application-level firewall

44
Q

A vendor who provides computerbased

services over the network.

A

ASP (Application Service Provider)

45
Q

The loss of signal experienced as data transmits over distance and across the network
medium.

A

attenuation

46
Q

A packet-switching technology that
provides transfer speeds ranging
from 1.544Mbps to 622Mbps.

A

ATM (Asynchronous Transfer Mode)

47
Q

The process by which a user’s identity is validated on a network. The most common
authentication method is a username
and password combination.

A

authentication