{"id":110262,"date":"2023-07-26T12:08:17","date_gmt":"2023-07-26T12:08:17","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=110262"},"modified":"2023-07-26T12:08:21","modified_gmt":"2023-07-26T12:08:21","slug":"wgu-c172-network-and-security-foundations-pa-and-oa-set-questions-and-answers-2022-2023-100-correct-verified-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/26\/wgu-c172-network-and-security-foundations-pa-and-oa-set-questions-and-answers-2022-2023-100-correct-verified-answers\/","title":{"rendered":"WGU C172 Network And Security Foundations PA and OA set Questions and Answers 2022\/2023| 100% Correct Verified Answers"},"content":{"rendered":"\n<p>It is a network of users that share computer resources in a limited area.<br>LAN<\/p>\n\n\n\n<p>Local Area Network<br>LAN<\/p>\n\n\n\n<p>How are Local Area Networks defined?<br>In terms of protocol and the topology used for accessing the network.<\/p>\n\n\n\n<p>A set of rules established for users to exchange information<br>Protocol<\/p>\n\n\n\n<p>The network architecture used to interconnect the networking equipment.<br>Topology<\/p>\n\n\n\n<p>What are the most common topologies for LANs?<br>Ring, Bus, and Star<\/p>\n\n\n\n<p>Uses a token that is placed in the data channel and circulates around the ring.<br>Token Ring topology<\/p>\n\n\n\n<p>A deterministic network<br>Token Ring Topology<\/p>\n\n\n\n<p>Each station connected to the network ensures access for transmission of its messages at regular or fixed time intervals<br>Deterministic<\/p>\n\n\n\n<p>What are the disadvantages of the Token Ring system?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>If an error changes the token pattern, it can cause the token to stop circulating.<\/li>\n<\/ol>\n\n\n\n<p>What is a disadvantage of the Token Ring system from the troubleshooting and maintenance?<br>The token ring path must be temporarily broken or interrupted if a computer or any device on the network is to be removed or added to the network.<\/p>\n\n\n\n<p>What is a solution to the troubleshooting and maintenance disadvantages of the Token Ring system?<br>Connect each computer or device on the network to a central token ring hub.<\/p>\n\n\n\n<p>A device that manages the passing of the token instead of relying on individual computers to pass it.<br>Token ring hub<\/p>\n\n\n\n<p>How does the token ring hub improve the network?<br>It improves the reliability of the network.<\/p>\n\n\n\n<p>Topology whereas the computers share the media or coaxial cable for data transmission.<br>Bus topology<\/p>\n\n\n\n<p>The coaxial cable that is looped through each networking device to transmit data in a bus topology<br>ThinNet<\/p>\n\n\n\n<p>In this topology, all devices on the network can see each other&#8217;s data traffic.<br>Bus topology<\/p>\n\n\n\n<p>Topology whereas each computer must wait for pauses in transmission or until the transmission from one device is complete before initiating a new transmission onto the network.<br>Bus topology<\/p>\n\n\n\n<p>What are the disadvantages of a bus topology?<br>&#8220;1. Data can be corrupted if ore than one device on the network transmits at the same time and will have to be resubmitted.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>The use of the shared coaxial cable prevents data transmission from being very bandwidth-efficient.&#8221;<\/li>\n<\/ol>\n\n\n\n<p>Which topology is seldomly used in modern networks?<br>Bus topology<\/p>\n\n\n\n<p>What is the most common topology used in today&#8217;s LANs?<br>Star topology<\/p>\n\n\n\n<p>Topology that uses twisted-pair cables with modular plugs to connect computers and other networking devices.<br>Star topology<\/p>\n\n\n\n<p>Topology whereas each device is connected to a switch or hub<br>Star<\/p>\n\n\n\n<p>A switch or hub facilitates the transfer of data between networking devices in this topology<br>star<\/p>\n\n\n\n<p>Transmits data to all the devices connected in the star network<br>hub<\/p>\n\n\n\n<p>Also called a multiport repeater<br>hub<\/p>\n\n\n\n<p>Not meant for large networks, but are still used in some smaller, slower speed LANs<br>hub<\/p>\n\n\n\n<p>A transmission from a hub in a star network to all the devices in the network connected to the hub<br>broadcast<\/p>\n\n\n\n<p>Stores the hardware or physical address for each device connected to its ports in a star network<br>switch<\/p>\n\n\n\n<p>Sends data transmissions directly to the port of the destination device on the network<br>switch<\/p>\n\n\n\n<p>The physical input\/output interfaces to the networking hardware<br>port<\/p>\n\n\n\n<p>Where the cables physically connect to each other or a central switch or hub<br>Port<\/p>\n\n\n\n<p>Only the intended destination device on this network will see the data traffic<br>star<\/p>\n\n\n\n<p>What is an advantage of the star topology?<br>It improves the efficiency of the available bandwidth of the network<\/p>\n\n\n\n<p>What is an advantage of the star topology from the troubleshooting and maintenance?<br>A device can be removed or added without disrupting other devices on the network<\/p>\n\n\n\n<p>All devices are connected to each other<br>mesh topology<\/p>\n\n\n\n<p>What is an advantage of the mesh network?<br>It provides full redundancy in the network data paths<\/p>\n\n\n\n<p>What is a disadvantage of the mesh network?<br>The additional data paths increase the cabling cost and the network hardware cost. It is also very complex.<\/p>\n\n\n\n<p>What type of applications is the mesh topology suited for?<br>high-reliability applications<\/p>\n\n\n\n<p>What type of applications is the mesh topology not suited for?<br>general networking applications<\/p>\n\n\n\n<p>Open systems interconnect reference model<br>OSI<\/p>\n\n\n\n<p>Who was the OSI model developed by?<br>The International Organization for Standardization<\/p>\n\n\n\n<p>What year was the OSI model developed?<br>1984<\/p>\n\n\n\n<p>What is the purpose of the OSI model?<br>to enable different types of networks to be linked together<\/p>\n\n\n\n<p>What is OSI meant for?<br>To provide a framework for networking devices that ensure compatibility in the network hardware and software.<\/p>\n\n\n\n<p>What is the OSI model meant to accelerate?<br>The development of new networking technologies.<\/p>\n\n\n\n<p>What is layer 1 of the OSI model?<br>Physical<\/p>\n\n\n\n<p>The layer of the OSI model that provides the electrical and mechanical connection to the network.<br>physical<\/p>\n\n\n\n<p>UTP, fiber, and network interface cards are examples of which layer of the OSI model?<br>physicaL<\/p>\n\n\n\n<p>What is layer 2 of the OSI model?<br>Data link<\/p>\n\n\n\n<p>Layer of the OSI model that handles error recovery, flow control (synchronization), and sequencing (which terminals are sending and which are receiving)<br>data link<\/p>\n\n\n\n<p>Also called the media access control layer<br>data Link<\/p>\n\n\n\n<p>The layer of the OSI model where the Media Access Control or MAC, addressing is defined<br>data lInk<\/p>\n\n\n\n<p>Where is the Ethernet 802.3 standard defined?<br>In the MAC or media access control<\/p>\n\n\n\n<p>Also called the Ethernet address<br>MAC or media access control<\/p>\n\n\n\n<p>MAC addresses are an example of which layer of the OSI model?<br>data linK<\/p>\n\n\n\n<p>What is layer 3 of the OSI model?<br>Network<\/p>\n\n\n\n<p>layer of the OSI model that accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.<br>network<\/p>\n\n\n\n<p>Acts as the network controller<br>network layer of the OSI model<\/p>\n\n\n\n<p>Internet Protocol (IP) and internetwork packet exchange (IPX) are examples of which layer of the OSI model?<br>networK<\/p>\n\n\n\n<p>What is layer 4 of the OSI model?<br>Transport<\/p>\n\n\n\n<p>layer of the OSI model that is concerned with message integrity between source and destination<br>transport<\/p>\n\n\n\n<p>layer of the osi model that also segments\/reassembles the packes and handles flow control<br>tRansport<\/p>\n\n\n\n<p>Transmission control protocol (TCP) and User Datagram Protocol are examples of which layer of the OSI model?<br>transporT<\/p>\n\n\n\n<p>What is layer 5 of the osi model?<br>Session<\/p>\n\n\n\n<p>layer of the osi model that provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user request<br>session<\/p>\n\n\n\n<p>Network File system (NFS) and Structured Query Language (SQL) are examples of which osi model layer?<br>sessioN<\/p>\n\n\n\n<p>What is layer 6 of the osi model?<br>Presentation<\/p>\n\n\n\n<p>layer of the osi model that accepts and structures the messages for the application. If necessary, it will translate one code to another<br>presentation<\/p>\n\n\n\n<p>layer of the osi model that is also responsible for data compression and encryption<br>pResentation<\/p>\n\n\n\n<p>American Standard Code for Information Interchange (ASCII) and Joint Photographic Experts Group (JPEG) are examples of which layer of the OSI model?<br>presentatioN<\/p>\n\n\n\n<p>What is layer 7 of the osi model?<br>Application<\/p>\n\n\n\n<p>layer of the osi model that interacts with application programs that incorporate a communication component such as your internet browser and email<br>application<\/p>\n\n\n\n<p>layer of the osi model that is also responsible for logging the message in, interpreting the request, and determining what information is needed to support the request<br>aPplication<\/p>\n\n\n\n<p>Hypertext Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer Protocol (SMTP) for email transmission are examples of which osi model layer?<br>applicatioN<\/p>\n\n\n\n<p>What is step one of the three basic steps in the process of isolating a network problem?<br>Is the connection to the machine down (layer 1)<\/p>\n\n\n\n<p>What is step two of the three basic steps in the process of isolating a network problem?<br>Is the network down? layer 3<\/p>\n\n\n\n<p>What is step three of the three basic steps in the process of isolating a network problem?<br>Is a service on a specific machine down? layer 7<\/p>\n\n\n\n<p>A reply from&#8221; response from a ping indicates whate?&#8221;<br>A connection to the server is up<\/p>\n\n\n\n<p>A request timed out&#8221; response from a ping indicates what?&#8221;<br>the network connection is down<\/p>\n\n\n\n<p>What is the function of the data link layer of the osi model?<br>to provide for the flow of data MAC addresses<\/p>\n\n\n\n<p>What is the function of the network layer?<br>to provide routing decisions IP, IPX<\/p>\n\n\n\n<p>What is the function of the transport layer of the osi model?<br>to ensure error free packets<\/p>\n\n\n\n<p>What is the function of the session layer of the osi model?<br>to establish, manage, and terminate NFS, SQL sessions<\/p>\n\n\n\n<p>What is the function of the presentation layer of the osi model?<br>to ensure protocol conversion, data transactions ASCII, JPEG<\/p>\n\n\n\n<p>What is function of the application layer of the osi model?<br>to support applications HTTP, FTP, and SMTP(email)<\/p>\n\n\n\n<p>Which networking protocol is used in most modern computer networks?<br>Ethernet<\/p>\n\n\n\n<p>A carrier sense multiple access with collision detection protocol for local area networks<br>Ethernet<\/p>\n\n\n\n<p>Must have the capability to detect data collisions (collision detection) to avoid two or more computers from attempting to broadcast a message at the same time.<br>Ethernet systems<\/p>\n\n\n\n<p>Provide grouping of information for transmission<br>packet<\/p>\n\n\n\n<p>What does the header of a packet consist of?<br>The preamble, start frame delimiter, destination and source addresses, and length\/type field<\/p>\n\n\n\n<p>Preamble, start frame delimiter, destination mac address, source address, length\/type, data, pad, and frame check sequence.<br>The structure of the Ethernet frame<\/p>\n\n\n\n<p>An alternating pattern of 1s and 0s used for synchronization<br>The preamble of an Ethernet packet<\/p>\n\n\n\n<p>A binary 8 bit sequence of 10101011 that indicates the start of the frame<br>The start frame delimiter of an Ethernet packet<\/p>\n\n\n\n<p>The MAC address associated with the network adapter or Ethernet network interface card (NIC)<br>The destination and source MAC addresses of an Ethernet packet<\/p>\n\n\n\n<p>An indication of the number of bytes in the data field if this value is less than 1500, or if the number is greater than 1500, and indication of the type of data format such as IP and IPX<br>The length\/type of the Ethernet packet frame<\/p>\n\n\n\n<p>The variable length of data being transferred from the source to the destiontion<br>The data of the Ethernet packet frame<\/p>\n\n\n\n<p>A field used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes<br>The pad of the Ethernet packet frame<\/p>\n\n\n\n<p>A 4 byte CRC value used for error detection<br>The frame check sequence of the Ethernet packet frame<\/p>\n\n\n\n<p>What is the minimum length of the Ethernet frame from destination MAC address through the frame check sequence?<br>64 bytes<\/p>\n\n\n\n<p>a device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all<br>range extender<\/p>\n\n\n\n<p>Where can range extenders be used to improve connectivity?<br>Stores, warehouses, and public places using hotspots<\/p>\n\n\n\n<p>a limited geopgraphic area that provides wireless access for the public<br>hot spot<\/p>\n\n\n\n<p>What basic steps can help secure a wireless home network?<br>&#8220;1. Change the default factory password<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Change the default SSID<\/li>\n\n\n\n<li>Turn encryption on<\/li>\n\n\n\n<li>Turn off the SSID broadcast<\/li>\n\n\n\n<li>Enable MAC address filtering&#8221;<\/li>\n<\/ol>\n\n\n\n<p>How should a default password on a wireless device be reset?<br>using a combination of alphanumeric characters<\/p>\n\n\n\n<p>the name used to identify your network and is used by your access point or wireless router to establish an association<br>SSID<\/p>\n\n\n\n<p>Service Set Identifier<br>SSID<\/p>\n\n\n\n<p>How many characters can the SSID be?<br>32<\/p>\n\n\n\n<p>What does the turning off the SSID broadcast of your access point or wireless router in your wireless home network do?<br>prevents the wireless system from broadcasting SSID<\/p>\n\n\n\n<p>What happens when MAC addressing filtering is turned on?<br>only wireless devices that have specific MAC addresses will be allowed access to the network<\/p>\n\n\n\n<p>What are ways of protecting your home network from outside threats?<br>&#8220;1.Network address translation<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Firewall protection<\/li>\n\n\n\n<li>establishing a VPN connection when transferring sensitive information&#8221;<\/li>\n<\/ol>\n\n\n\n<p>What does a network address translation allow the outsider to see?<br>Only the router IP address<\/p>\n\n\n\n<p>Why does the network address translation allow the outsider to only see the router IP address?<br>because the ip addresses of the internal networking devices are not provided on the Internet<\/p>\n\n\n\n<p>Prevents unauthorized access to your network<br>a firewall<\/p>\n\n\n\n<p>a type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request<br>state packet inspection (SPI)<\/p>\n\n\n\n<p>a virtual private network that establishes a secure network connection<br>VPN<\/p>\n\n\n\n<p>type of connection that is encrypted<br>VPN connection<\/p>\n\n\n\n<p>a technique that translates the private IP address of a computer to a public address for routing over the Internet<br>Network Address Translation (NAT)<\/p>\n\n\n\n<p>a technique used by a router, where NAT translates the home&#8217;s network&#8217;s private IP addresses to the single public IP address assigned by the ISP<br>Overloading<\/p>\n\n\n\n<p>What technique does a router use to track a port number for when a data packet is returned to a home network to idenfity which computer to deliver the packet to?<br>Port Address Translation (PAT)<\/p>\n\n\n\n<p>a cable that has cross-connected TX\/RX data lines<br>crossover<\/p>\n\n\n\n<p>In a straight-through, how are transmit and receive signal pares aligned?<br>end to end<\/p>\n\n\n\n<p>Also called an uplink port<br>Straight-through ports<\/p>\n\n\n\n<p>allows the connection of a hub or switch to another hub or switch without having to use a crossover cable<br>an uplink port<\/p>\n\n\n\n<p>Which devices require a cross-connect input port?<br>computers, printers, and routers<\/p>\n\n\n\n<p>Which devices require a straight-through connection?<br>unlink connections to other switches or hubs<\/p>\n\n\n\n<p>What does a link light on the switch or hub indcate?<br>that the transmit and receive pairs are properly aligned and the connected devices are comunicating<\/p>\n\n\n\n<p>an Ethernet protocol used to verify that a communication link between two Ethernet devices has been established<br>link integrity test<\/p>\n\n\n\n<p>Why are link pulses sent by each of the connected devices via the twisted pair cables?<br>to indicate that the link is up<\/p>\n\n\n\n<p>when are link pulses sent when data is not being transmitted?<br>at regular intervals<\/p>\n\n\n\n<p>Uses Internet Control Message Protocol (ICMP) echo request and replies to test that a device on the network is reachable<br>the ping command<\/p>\n\n\n\n<p>Where is the ping command issued in Windows to verify the networking devices are communicationg?<br>the command window<\/p>\n\n\n\n<p>twisted pair cables capable of carrying up to 1000 mbps (1 gigabit) of data up to a length of 100 meters<br>CAT6<\/p>\n\n\n\n<p>What is the maximum length of the Ethernet fram from destination MAC address through the frame check sequence?<br>1518 bytes<\/p>\n\n\n\n<p>Media Access Control<br>MAC<\/p>\n\n\n\n<p>Each NIC or network interface card has a unique network address called what?<br>MAC address<\/p>\n\n\n\n<p>What is the length of a MAC address?<br>6 bytes or 48 bits<\/p>\n\n\n\n<p>A MAC address is displayed in which format?<br>12 hexadecimal digits<\/p>\n\n\n\n<p>The Organizationally Unique Identifier (OUI) is which digits of the MAC address?<br>The first six digits<\/p>\n\n\n\n<p>Indicates the vendor of the network interface<br>organizationally unique identifier OUI)<\/p>\n\n\n\n<p>A unique value for each NIC assigned by the vendor<br>The last six digits of a MAC address<\/p>\n\n\n\n<p>Also called the Ethernet address, the physical address, the hardware address, and the adapter address<br>MAC address<\/p>\n\n\n\n<p>What does ipconfig\/all display when entered as a command in the command mode or at the MS-DOS prompt?<br>MAC address<\/p>\n\n\n\n<p>Which base are MAC addresses listed in?<br>hexadecimal (base-16)<\/p>\n\n\n\n<p>Only provides the physical address for the network interface card<br>MAC address<\/p>\n\n\n\n<p>A mac address does not provide what?<br>the network location, what LAN, or in which building, city, or country the network resides<\/p>\n\n\n\n<p>Incorporates a unique address that identifies the computer&#8217;s network<br>Internet Protocol (IP)<\/p>\n\n\n\n<p>Who assigns IP network numbers?<br>Internet Assigned Numbers Authority (IANA)<\/p>\n\n\n\n<p>How many bits are in an IP address?<br>32<\/p>\n\n\n\n<p>Identifies on which network the computer is located and differentiates the computer from all other devices on the same network<br>IP address<\/p>\n\n\n\n<p>How many bit parts are each IP address divided into?<br>four 8 bit parts<\/p>\n\n\n\n<p>What are class A ip addresses used for?<br>governments and very large networks<\/p>\n\n\n\n<p>What is the maximum number of hosts for a class A ip address?<br>16,777 or 2^24<\/p>\n\n\n\n<p>What are class B ip addresses used for?<br>midsize companies, universities<\/p>\n\n\n\n<p>What are the maximum number of hosts on a class B ip address?<br>65,534 or 2^16<\/p>\n\n\n\n<p>What are class C ip addresses used for?<br>small networks<\/p>\n\n\n\n<p>What are the maximum number of hosts for a class C IP address?<br>254 or 2^8<\/p>\n\n\n\n<p>What are class D ip addresses used for?<br>reserved for multicast groups<\/p>\n\n\n\n<p>What do class A ip addresses begin with?<br>0 thru 127<\/p>\n\n\n\n<p>What do class B ip addresses begin with?<br>128 thru 191<\/p>\n\n\n\n<p>What do class C ip address begin with?<br>192 thru 223<\/p>\n\n\n\n<p>what do class D ip addresses begin with?<br>224 thru 239<\/p>\n\n\n\n<p>The first set of numbers in an IP address are what?<br>the network number<\/p>\n\n\n\n<p>What does the network number do?<br>defines which network the IP packet is originating from or being delivered to<\/p>\n\n\n\n<p>What are the last three sets of numbers in an IP address?<br>the Host number<\/p>\n\n\n\n<p>The Host number is also called what?<br>the Host address<\/p>\n\n\n\n<p>The portion of the IP address that defines the address of the networking device that is connected to the network<br>The Host number<\/p>\n\n\n\n<p>What do the network number and the host number do when they are together?<br>display which network an IP packet is coming from or going to, and which device on that network an IP packet is coming from or going to.<\/p>\n\n\n\n<p>Who assigns the host number?<br>the local network system administrator or your Internet Service Provider (ISP)<\/p>\n\n\n\n<p>ipconfig in the command prompt will display what?<br>the IP address for your computer<\/p>\n\n\n\n<p>IP addresses set aside for use in a private intranet<br>Private address<\/p>\n\n\n\n<p>An internal Internetwork that provides file and resource sharing<br>intranet<\/p>\n\n\n\n<p>Why can&#8217;t private addresses be used on the internet?<br>They are invalid addresses reserved for internal use and are not routable on the internet.<\/p>\n\n\n\n<p>Can be used within a private LAN (intranet) to create an IP Internetwork<br>private addresses<\/p>\n\n\n\n<p>uses IP addressing for indentifying devices connected to the network<br>IP Internetwork<\/p>\n\n\n\n<p>Is also the addressing scheme used in TCP\/IP networks<br>IP Internetwork<\/p>\n\n\n\n<p>Transmission Control Protocol\/Internet Protocol<br>TCP\/IP<\/p>\n\n\n\n<p>the protocol suite used for Internetworks such as the Internet<br>TCP\/IP<\/p>\n\n\n\n<p>Uses cables and connectors to establish the network connection<br>wired network<\/p>\n\n\n\n<p>uses radio signals to establish the network connection<br>wireless network<\/p>\n\n\n\n<p>What is the most common home network configuration?<br>wireless network<\/p>\n\n\n\n<p>What are the advantages of a wired network?<br>&#8220;1. faster network data transfer speedds (within the LAN)<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>relatively inexpensive to set up<\/li>\n\n\n\n<li>network is not susceptible to outside interference&#8221;<\/li>\n<\/ol>\n\n\n\n<p>What are the disadvantages of a wired network?<br>&#8220;1. Cable connections typically require the use of specialized tools<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>the cable installation can be labor intensive<\/li>\n\n\n\n<li>The cable installation can be expensive&#8221;<\/li>\n<\/ol>\n\n\n\n<p>What are the advantages of a wireless network?<br>&#8220;1. mobility<br>2.simple installation<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>no cables&#8221;<\/li>\n<\/ol>\n\n\n\n<p>What are the disadvantages of a wireless network?<br>&#8220;1.security issues<br>2.data speeds within the LAN can be slower&#8221;<\/p>\n\n\n\n<p>Another name for a wireless network and the abbreviated name for the WI-FI Alliance, or wireless fidelity<br>Wi-Fi<\/p>\n\n\n\n<p>What is the Wi-Fi Alliance?<br>An organization whose function is to test and certify wireless equipment for compliance with the 802.11x standards<\/p>\n\n\n\n<p>A group of wireless standards developed under IEEE 802.11<br>802.11x<\/p>\n\n\n\n<p>What is the data transfer rate of 802.11a wireless standard?<br>54 mbps<\/p>\n\n\n\n<p>What is the operating range for the 802.11a wireless standard?<br>up to 75 feet<\/p>\n\n\n\n<p>802.11a standard operates at what GHz?<br>5 GHz<\/p>\n\n\n\n<p>Which 802.11x wireless standards all operate at 2.4 GHz?<br>802.11b,g, and n<\/p>\n\n\n\n<p>What are the data transfer rates and operating ranges for 802.11b wireless standard?<br>up to 11 mbps with ranges of 100-150 feet<\/p>\n\n\n\n<p>What are the data transfer rates and operating ranges for 801.11g wireless standard?<br>up to 54 Mbps and up to 150 feet<\/p>\n\n\n\n<p>The next generation of high speed wireless connectivity<br>802.11n wireless standard<\/p>\n\n\n\n<p>What is the data transfer rate for 802.11n wireless standard?<br>4 x 802.11g speeds (200+ mbps)<\/p>\n\n\n\n<p>What are the two most common broadband connections to the Internet Service Provider (ISP)?<br>via a cable modem and DSL<\/p>\n\n\n\n<p>In some cases, what device may also have the configuration settings for managing the router, which can include the setting for connecting to the ISP?<br>One of the computers<\/p>\n\n\n\n<p>A device used to interconnect wireless networking devices and to give access to wired devices, and establish the broadband internet connection to the ISP<br>wireless router<\/p>\n\n\n\n<p>Is a hub or switch the best choice for interconnecting networking devices?<br>switch<\/p>\n\n\n\n<p>A type of network adapter used in desktop computers<br>network interface card or NIC<\/p>\n\n\n\n<p>Can be a NIC inserted into an expansion slot on the computers motherboard<br>A wired network adapter<\/p>\n\n\n\n<p>Where does a PC Card adapter connect to?<br>Notebook computers<\/p>\n\n\n\n<p>What does a PC card adapter do?<br>provides an RJ-45 jack for connecting to wired networks<\/p>\n\n\n\n<p>The PC card adapter supports connects to which networks?<br>Both 10 mbps and 100 mbps networks<\/p>\n\n\n\n<p>Which 802.11x wireless technologies are compatible?<br>b,g, and n<\/p>\n\n\n\n<p>When there is a combination of wireless b, g, and\/or n technologies, which frequency will be set for the combined technologies?<br>The slowest speed<\/p>\n\n\n\n<p>Where does a wireless n adapter insert into?<br>A notebook or laptop computer PC card slot<\/p>\n\n\n\n<p>Which wireless technologies offer the highest data transfer speed?<br>Wireless n<\/p>\n\n\n\n<p>Where does a USB network adapter connect to?<br>The USB port on a computer<\/p>\n\n\n\n<p>A networking device used to connect two or more networks using a single connection to your ISP such as your LAN and the Internet<br>A router<\/p>\n\n\n\n<p>A device used to interconnect wireless devices and provide a connection to the wired LAN.<br>Access point<\/p>\n\n\n\n<p>What does a wireless router contain?<br>A router, switch, and wireless access point<\/p>\n\n\n\n<p>Which is the most common way to interconnect wireless LANs to the ISP&#8217;s access device?<br>A wireless router<\/p>\n\n\n\n<p>A device used to provide high speed data access via your cable connection or via a telephone company&#8217;s DSL connection<br>broadband modem\/gateway<\/p>\n\n\n\n<p>combines a modem and a router into one network box<br>a gateway<\/p>\n\n\n\n<p>a device that is used to make a broadband network connection from your home network to the ISP using your cable connection.<br>cable modem<\/p>\n\n\n\n<p>What tool does a cable modem require at setup to separate the cable TV from the home network<br>a splitter<\/p>\n\n\n\n<p>Who is the iSP for a cable modem usually?<br>the cable TV service provider<\/p>\n\n\n\n<p>a device that is used to make a broadband connection from your home network to the ISP using the telephone line<br>DSL modem<\/p>\n\n\n\n<p>Who is the ISP for a DSL modem?<br>the telephone company or separate ISP<\/p>\n\n\n\n<p>What does a DSL connection to a DSL modem require?<br>The placement of filters on all telephone lines except the one going into the modem to prevent interference.<\/p>\n\n\n\n<p>What issues should be considered when planning a home network?<br>data speed, cost, ease of implementation, appearance, home access, and public access<\/p>\n\n\n\n<p>Which network offers the fastest speeds for a home network?<br>wired network<\/p>\n\n\n\n<p>What data transfer rates can a wired network offer up to inside the home network?<br>up to 10 gbps<\/p>\n\n\n\n<p>Which wireless technology can the best data transfer rates be achieved with in a wired home network?<br>wireless n technology<\/p>\n\n\n\n<p>Which type of network is less expensive to implement in a home network?<br>wireless networks<\/p>\n\n\n\n<p>Why does the wireless network offer the best appearance for a home network?<br>it has only one external connection to the ISP<\/p>\n\n\n\n<p>Which network will offer the best data transfer speed for home access of the home network?<br>the wired network<\/p>\n\n\n\n<p>the wireless network will offer what for home access of the home network?<br>best mobility<\/p>\n\n\n\n<p>What is the limiting factor when considering the data transfer rate for public access?<br>the data rate transfer connection to and from the ISP<\/p>\n\n\n\n<p>What are the four steps for troubleshooting wired and wireless home networks?<br>&#8220;1. Check the lights on the networking device<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Reboot the host computer connected to the router and reboot the router<\/li>\n\n\n\n<li>Verify the hardware cable or phone connection is in place<\/li>\n\n\n\n<li>Verify your network settings&#8221;<\/li>\n<\/ol>\n\n\n\n<p>Wheat do incorrect lights on the networking device indicate?<br>a connection problem with your network device<\/p>\n\n\n\n<p>Application Layer(7th layer)<br>Interacts with application programs that incorporate a communication component such as your internet browser and email (provides user interface)<\/p>\n\n\n\n<p>Bus Topology<br>The computers share the media (coaxial cable) for data transmission<\/p>\n\n\n\n<p>CAT6 (category 6)<br>Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters<\/p>\n\n\n\n<p>Crossover<br>Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal on the other device<\/p>\n\n\n\n<p>CSMA\/CD<br>Carrier sense multiple access with collision detection is the Ethernet LAN media-access method (used to prevent collisions in wired Ethernet networks) Used in wireless networks for to reduce collisions.<\/p>\n\n\n\n<p>Data Link Layer (2nd layer)<br>Layer of the OSI reference model that handles error recovery.flow control (synchronization), and sequencing controls which terminals are sending and receiving. Media access is controlled (MAC) by the Data Link Layer<\/p>\n\n\n\n<p>Deterministic<br>Access to the network is provided at fixed time intervals<\/p>\n\n\n\n<p>Ethernet, Physical, Hardware, or Adapter Address<br>Other names for MAC address<\/p>\n\n\n\n<p>Firewall Protection<br>Used to prevent unauthorized access to your network<\/p>\n\n\n\n<p>Host Address\/Number<br>The portion of the IP address that defines the location of the networking device connected to the network also called the hose address<\/p>\n\n\n\n<p>Hotspots<br>A limited geographic area that provides wireless access for the public<\/p>\n\n\n\n<p>Hub<br>Broadcasts the data it receives to all devices connected to its ports\u2026 it is possible for network devices to pick up a data intended for a different device\u2026 considered a multiport repeater. Is on the Physical Layer (layer 1)<\/p>\n\n\n\n<p>IANA<br>The Internet Assigned Numbers Authority is the agency that assigns IP addresses to computer networks<\/p>\n\n\n\n<p>ICMP<br>Internet Control Message Protocol (preform diagnostics, report errors, control the flow of data in the network)<\/p>\n\n\n\n<p>IEEE<br>Institute of Electrical and Electronics Engineers, on of the major standard-setting bodies for technological development<\/p>\n\n\n\n<p>Intranet<br>An internal network the provides file and resource sharing but it&#8217;s not accessed from the internet<\/p>\n\n\n\n<p>IP Address<br>Unique 32-bit address the identifies on which network the computer is located as well as differentiate the computer from all other devices on the same network; they are logical addresses and can be found using the ipconfig\/all command<\/p>\n\n\n\n<p>IP Internetwork<br>A network that uses IP addressing for identifying devices connected to the network<\/p>\n\n\n\n<p>ipconfig\/all<br>Enables the MAC address information to be displayed from the command prompt<\/p>\n\n\n\n<p>ISP<br>Internet service provider<\/p>\n\n\n\n<p>Link Integrity Test<br>Protocol used to verify that a communication link between two Ethernet devices has been established.<\/p>\n\n\n\n<p>Link Light<br>Indicates that the transmit and receive pairs are properly aligned<\/p>\n\n\n\n<p>Link Pulses<br>Sent by each of the connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up<\/p>\n\n\n\n<p>Local Area Network (LAN)<br>Network of users that share computer resources in a limited area<\/p>\n\n\n\n<p>MAC Address<br>A unique 6-byte address assigned by the vendor of the network interface card; A MAC address has two portions. The OUI is comprised of the first 6 digits and the last half is assigned by the manufacturer.<\/p>\n\n\n\n<p>Mbps<br>Megabits per second<\/p>\n\n\n\n<p>Mesh Topology<br>All networking devices are directly connected to each other (fault tolerant; stations can still communicate if some segments go down)<\/p>\n\n\n\n<p>Multiport Repeater<br>Another name for a hub<\/p>\n\n\n\n<p>Network Address Translation (NAT)<br>Translates the private IP address to a public address for routing over the internet<\/p>\n\n\n\n<p>Network Interface Card(NIC)<br>The electronic hardware used to interface the computer to the network<\/p>\n\n\n\n<p>Network Layer (3rd layer)<br>Defines how data packets are routed in a network. Accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information (provides a logical path for data)<\/p>\n\n\n\n<p>Network Number<br>The portion of the IP address that defines which network the IP packet is originating from or being delivered to<\/p>\n\n\n\n<p>Organizationally Unique Identifier (OUI)<br>The first 3 bytes of the MAC address the identifies the manufacturer of the network hardware (ex. Network interface card has MAC address of 00-00-86-15-7A, the OUI is 00-00-86)<\/p>\n\n\n\n<p>OSI<br>Open system interconnect<\/p>\n\n\n\n<p>OSI Model<br>The seven layers describing network funcations<\/p>\n\n\n\n<p>overloading<br>Where NAT translates the home network&#8217;s private IP addresses to a single public IP address<\/p>\n\n\n\n<p>Packet<br>Provides grouping of the information for transmission<\/p>\n\n\n\n<p>Physical Layer (1st layer)<br>Layer of the OSI reference model that provides the electrical and mechanical connection to the network Describes the media that interconnects networking devices<\/p>\n\n\n\n<p>Ping<br>Command used to test that a device on the network is reachable (If you can&#8217;t connect to a networked computer, you can use the ping command to check connectivity) Used in windows in the command window<\/p>\n\n\n\n<p>Port address Translation (PAT)<br>A port number is tracked with the client computer&#8217;s private address when translating to a public address<\/p>\n\n\n\n<p>Ports<br>The physical input\/output interfaces to the networking hardware<\/p>\n\n\n\n<p>Presentation Layer (6th layer)<br>Layer of the OSI reference model that accepts and structures the messages for the application<\/p>\n\n\n\n<p>Private Addresses<br>IP addresses set aside for use in private intranet<br>10.0.0.0 &#8211; 10.255.255.255<br>172.16.0.0 &#8211; 172.31.255.255<br>192.168.0.0 &#8211; 192.168.255.255<\/p>\n\n\n\n<p>Protocol<br>Set of rules established for users to exchange information<\/p>\n\n\n\n<p>Range Extender<br>Device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all<\/p>\n\n\n\n<p>RJ-45<br>The 8-pin modular connector used with CAT6\/5e\/5 cable<\/p>\n\n\n\n<p>Service Set Identifier (SSID)<br>Name that is used to identify your wireless network and is used by your access point or wireless router to establish and association<\/p>\n\n\n\n<p>Session Layer (5th Layer)<br>Layer of the OSI reference model that provides the control functions necessary to establish, manage, and terminate the connections (SQL and NFS technologies are on the session layer)<\/p>\n\n\n\n<p>SSID<br>Service set identifier<\/p>\n\n\n\n<p>Star Topology<br>The most common networking topology in today&#8217;s LANs where all networking devices connect to a central switch or hub, each device connects to a central point via a point-to-point link. Each device is connected to its own port<\/p>\n\n\n\n<p>Stateful Packet Inspection (SPI)<br>Type of firewall that inspects<\/p>\n\n\n\n<p>6to4 Prefix<br>a technique that enables IPv6 hosts to communicate over the IPv4 Internet<\/p>\n\n\n\n<p>Access Control List (ACLs)<br>A basic form of firewall protection<\/p>\n\n\n\n<p>ACK<br>Acknowledgement packet<\/p>\n\n\n\n<p>AES<br>Advanced Encryption Standard<\/p>\n\n\n\n<p>AH<br>Authentication Header<\/p>\n\n\n\n<p>Anycast address<br>Is obtained from a list of addresses.<\/p>\n\n\n\n<p>ARIN<br>American Registry for Internet Numbers<\/p>\n\n\n\n<p>ARP<br>Address Resolution Protocol, used to map and IP address to its MAC address (the destination gets the sender&#8217;s addresses from the ARP request)<\/p>\n\n\n\n<p>ARPAnet<br>Advanced Research Projects Agency network<\/p>\n\n\n\n<p>Brute Force Attack<br>Attacker uses every possible combination of characters for the password<\/p>\n\n\n\n<p>Buffer Overflow<br>Happens when a program tries to put more data into a buffer than it was configured to hold<\/p>\n\n\n\n<p>CHAP<br>Challenge Handshake Authentication Protocol<\/p>\n\n\n\n<p>CIDR<br>Classless interdomain routing<\/p>\n\n\n\n<p>CIDR Block<br>The grouping of two or more class networks together; also called supernetting<\/p>\n\n\n\n<p>Class A, B, C, D, and E<br>The five classes of IPv4<\/p>\n\n\n\n<p>Classfull<br>the IP and subnet addresses are within the same network<\/p>\n\n\n\n<p>Connection-Oriented Protocol<br>Establishes a network connection, manages the delivery of data, and terminates the connection<\/p>\n\n\n\n<p>Denial of Service (DoS)<br>A service is being denied to a computer, network or server<\/p>\n\n\n\n<p>DES, 3DES<br>Data Encryption Standard, Triple Data Encryption Standard<\/p>\n\n\n\n<p>Dictionary Attack<br>Uses Known passwords and many variations (upper and lowercase and combinations) to try to log into your account<\/p>\n\n\n\n<p>Diffie-Hellman<br>Key generation algorithm<\/p>\n\n\n\n<p>Directed Broadcast<br>The broadcast is sent to a specific subnet<\/p>\n\n\n\n<p>EAP<br>Extensible Authentication protocol<\/p>\n\n\n\n<p>ESP<br>Encapsulating Security Protocol<\/p>\n\n\n\n<p>Firewall<br>Used in computer networks for protecting the network; Personal firewall software is typically based on basic packet filtering inspections where the firewall accepts or denies incoming network traffic based on information contained in the packet&#8217;s TCP or IP headers.<\/p>\n\n\n\n<p>Full IPv6 Address<br>All 32 hexadecimal positions contain a value other than 0 (double colons, 32, hex characters, 128 bits)<\/p>\n\n\n\n<p>GRE<br>Generic Routing Encapsulation<\/p>\n\n\n\n<p>Hex<br>Hexadecimal, base 16<\/p>\n\n\n\n<p>ICANN<br>The Internet Corporation of Assigned Names and Numbers<\/p>\n\n\n\n<p>IGMP<br>Internet Group Message Protocol (Used for streaming media\u2026 data is passed through to the application layer for immediate processing without error checking)<\/p>\n\n\n\n<p>IKE<br>Internet Key Exchange<\/p>\n\n\n\n<p>Internet Layer<br>Defines the protocols used for addressing and routing data packets<\/p>\n\n\n\n<p>IP (Internet protocol)<br>Defines the addressing used to identify the source and destination addresses of data packets being delivered over an IP network<\/p>\n\n\n\n<p>IP Tunnel<br>An IP packet encapsulated in another IP packet (a secure VPN connection between two endpoints in known as an IP Tunnel)<\/p>\n\n\n\n<p>IPng<br>The next generation IP<\/p>\n\n\n\n<p>IPsec<br>IP security is used to encrypt data between various networking devices (AES, ESP, and DES are security protocols, not TKIP which is wireless protocol)<\/p>\n\n\n\n<p>IPv4<br>The IP version currently being used on the internet (Dotted decimal) Uses five classes of IP addresses, is being replaced by IPv6. Made up 4 bytes and octets. An Octet is 8 bits. 4 makes up 32 bits of an IP address.<\/p>\n\n\n\n<p>IPv6<br>IP version 6 (unicast, multicast, and anycast all IPv6 addresses)<\/p>\n\n\n\n<p>ISAKMP<br>Internet Security Association and Key Management Protocol<\/p>\n\n\n\n<p>L2F<br>Layer 2 Forwarding<\/p>\n\n\n\n<p>L2TP<br>Layer 2 Tunneling Protocol<\/p>\n\n\n\n<p>Malware<br>Malicious programs<\/p>\n\n\n\n<p>MD5<br>Message Digest 5<\/p>\n\n\n\n<p>Multicast Address<br>Data packets sent to a multicast address are sent to the entire group of networking devices, such as group of routers running the same routing protocol<\/p>\n\n\n\n<p>Multicasting<br>When one host sends data to many destination hosts<\/p>\n\n\n\n<p>NCP<br>Network Control Protocol<\/p>\n\n\n\n<p>Netstat -a -b<br>(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port<\/p>\n\n\n\n<p>Network Interface Layer<br>Defines how the host connects to the network<\/p>\n\n\n\n<p>Non-Internet Rotatable IP Addresses<br>IP addresses no routed on the Internet<\/p>\n\n\n\n<p>Packet Filtering<br>A limit is placed on the information that can enter the network<\/p>\n\n\n\n<p>Packet Sniffing<br>A technique in which the contents of data packets are watched (assumes that the attacker can see the network data packets; performed using a machine attached to the network)<\/p>\n\n\n\n<p>PAP<br>Password Authentication Protocol<\/p>\n\n\n\n<p>PPP<br>Point-to-Point Protocol (the de facto standard in dial-up VPNs)<\/p>\n\n\n\n<p>PPTP<br>Point to Point Tunneling Protocol<\/p>\n\n\n\n<p>Prefix length notation<br>Another shorthand technique for writing the subnet mask except class boundaries are not being crossed<\/p>\n\n\n\n<p>Proxy Server<br>Clients go through a proxy to communicate with secure systems<\/p>\n\n\n\n<p>RIRs<br>Regional Internet registries, IANA-designated governing organizations responsible for IP address allocation by geographical location<\/p>\n\n\n\n<p>SHA-1<br>Secure Hash Algorithm<\/p>\n\n\n\n<p>Social Engineering<br>A way for an intruder to obtain enough information from people to gain access to the network<\/p>\n\n\n\n<p>Spoof<br>Inserting a different IP address in place of an IP packet&#8217;s source address to make it appear that the packet came from another network<\/p>\n\n\n\n<p>Statefull Firewall<br>Keeps track of data packet flow<\/p>\n\n\n\n<p>Supernets<br>The grouping go two or mare class network together; also called CIDR blocks<\/p>\n\n\n\n<p>Supernetting<br>Allows multiple networks to be specified by one subnet mask (allows the representation of multiple networks with one address)<\/p>\n\n\n\n<p>syn<br>Synchronizing packet<\/p>\n\n\n\n<p>SYN ACK<br>Synchronizing Acknowledgement packet<\/p>\n\n\n\n<p>TCP<br>Transport Control Protocol (example of a connection oriented protocol)<\/p>\n\n\n\n<p>Transport Layer Protocols<br>`Define the type of connection established between hoses and how acknowledgements are sent<\/p>\n\n\n\n<p>UDP<br>User Datagram Protocol; UDP is a connectionless protocol that doesn&#8217;t use acknowledgements<\/p>\n\n\n\n<p>Unicast Addresses<br>Used to identify a single network interface address, and data packets are sent directly to the computer with the specified IPv6 address<\/p>\n\n\n\n<p>Virus<br>A piece of malicious computer code that, when opened, can damage your hardware, software, or other files<\/p>\n\n\n\n<p>Well-known Ports<br>Ports reserved by ICANN<\/p>\n\n\n\n<p>Worm<br>A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks<\/p>\n\n\n\n<p>10GBASE-T<br>10Gbps over twisted-pair copper cable (splits the data into 4 channels of 2.5G each) Uses multilevel encoding to reduce required bandwidth for tranmission<\/p>\n\n\n\n<p>ACR<br>The attention-to-crosstalk ratio measurement compares the signal level from a transmitter at the far end to the crosstalk measured at the near end. A larger ACR indicates that the cable has a greater data capacity and also indicates the cable&#8217;s ability to handle a greater bandwidth. Essentially, it is a combined measurement of the quality of the cable. A higher ACR value (dB) is desirable.<\/p>\n\n\n\n<p>Alien Crosstalk (AXT)<br>Unwanted signal coupling from one permanent link to another<\/p>\n\n\n\n<p>Attenuation (Insertion Loss)<br>The amount of loss in the signal strength as it propagates down a wire or fiber strand (leakage and resistance cause attenuation in fiber optic systems)<\/p>\n\n\n\n<p>Balanced mode<br>Neither wire in the wire pairs connects to the ground<\/p>\n\n\n\n<p>Bottle-necking<br>Another term for networking congestion<\/p>\n\n\n\n<p>Building Entrance<br>The point where the external cabling and wireless services interconnect with the internal building calbing<\/p>\n\n\n\n<p>Campus Network<br>A collection of two or more interconnected LANs in a limited geographic area<\/p>\n\n\n\n<p>CAT7\/7a and CAT6a<br>UTP cable standards that support 10GB data rates for a length of 100 meters<\/p>\n\n\n\n<p>Color map<br>The specification of which wire color connects to which pin on the connector<\/p>\n\n\n\n<p>Cross-connect<br>A space where you are going to take one or multiple cables and connect them to one or more cables or equipment<\/p>\n\n\n\n<p>Crossover Cable<br>Transmit and receive wire pairs are crossed (transmit and receive wires crossed, don&#8217;t connect to the same pins on each end)<\/p>\n\n\n\n<p>Cross talk<br>Signal coupling in a cable<\/p>\n\n\n\n<p>Delay Skew<br>This is a measure of the different in arrival time between the fastest and the slowest signal in the UTP wire pair<\/p>\n\n\n\n<p>EIA<br>Electronic Industries Alliance<\/p>\n\n\n\n<p>EIA\/TIA 568-B<br>The standard that defines the six subsystems of a structured cabling system<\/p>\n\n\n\n<p>ELTCTL<br>Equal Level Transverse Conversion Transfer Loss<\/p>\n\n\n\n<p>EMI<br>Electromagnetic Interference<\/p>\n\n\n\n<p>Entrance Facilities (EF)<br>A room set aside for complex electronic equipement<\/p>\n\n\n\n<p>Equal Level FEXT (ELFEXT)<br>This measurement differs from NEXT in that the measurement is for the far end of the cable. Additionally, the ELFEXT measurement does not depend on the length of the cable. This is because ELFEXT is obtained by subtracting the attenuation value from the far-end crosstalk (FEXT!!) loss<\/p>\n\n\n\n<p>Equipment Room (ER)\/Backbone Cabling<br>Cabling that interconnects telecommunication closets in the same building and between buildings<\/p>\n\n\n\n<p>F\/UTP<br>Foil over twisted-pair cabling (better security, noise immunity for EMI) It minimizes signal leakage and provides noise immunity from EMI<\/p>\n\n\n\n<p>FastEthernet<br>An Ethernet system operating as 100MBps<\/p>\n\n\n\n<p>Full Channel<br>Consists of all the link elements from the wall plate to the hub or switch<\/p>\n\n\n\n<p>Full Duplex<br>Computer system can transmit and receive at the same time (full duplex gigabit Ethernet uses 4 pairs)<\/p>\n\n\n\n<p>Gigabit Ethernet \/ twisted pair cables<br>1000Mbps Ethernet; CAT6 and CAT5e rated for 1000Mbps<\/p>\n\n\n\n<p>Horizontal Cabling<br>Cabling that extends out from the telecommunication closet into the LAN work area<\/p>\n\n\n\n<p>Horizontal Cross-connect (HC)<br>The connection between the building distributors and the horizontal cabling to the work area or workstation outlet-another term used for the HC is the floor distributors (FD)<\/p>\n\n\n\n<p>Hybrid Echo Cancellation Circuit<br>Removes the transmitted signal from the receive signal<\/p>\n\n\n\n<p>IEEE 802.3an-200610GBASE-T<br>The standard for 10 Gbps<\/p>\n\n\n\n<p>Intermediate Cross-connect (IC)<br>Also called the building distributor (BD), this is the building&#8217;s connection point to the campus backbone. The IC links the MC to the horizontal cross-connect (HC).<\/p>\n\n\n\n<p>LCL<br>Longitudinal Conversion loss<\/p>\n\n\n\n<p>Link<br>Point from one cable termination to another<\/p>\n\n\n\n<p>Main Cross-connect (MC)<br>Usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building. It is also called the main distribution frame (MDF) or main equipment room. The MC connects to Telco, an ISP, and so on. Another term for the MC is the campus distributor (CD).<\/p>\n\n\n\n<p>Multilevel Encoding<br>Technique used to reduce in the required bandwidth required to transport the data<\/p>\n\n\n\n<p>Near-end Crosstalk (NEXT)<br>A measure of the level of crosstalk or signal coupling within the cable, with a high NEXT (db) value being desirable<\/p>\n\n\n\n<p>Network Congestion<br>A slowdown on network data traffic movement<\/p>\n\n\n\n<p>Nominal Velocity of Propagation (NVP)<br>NVP is some percentage of the velocity of light and is dependent on the type of cable being tested. The typical delay value for CATD\/De UTP cable is about 5.7 nsec per meter. The EIA\/TIA specification allows for 548 nsec for the maximum 100-meter run for CAT5e, CAT6, CAT6, CAT6a, CAT7, and CAT7A<\/p>\n\n\n\n<p>Power Sum NEXT (PSNEXT)<br>The enhanced twisted-pair cable must meet four-pair NEXT requirements, called PSNEXT testing. Basically, power sum testing measures the total crosstalk of all cable pairs. This test ensures that the cable can carry data traffic on all four pairs at the same time with minimal interference. A higher PSNEXT value is desirable because it indicates better cable performance.<\/p>\n\n\n\n<p>Propagation Delay<br>This is a measure of the amount of time it takes for a signal to propagate from one end of the cable to the other. The delay of the signal is affected by the nominal velocity of propagation (NVP) of the cable.<\/p>\n\n\n\n<p>PSAACRF<br>Power-sum Alien Attenuation Cross-talk Ratio Far-End<\/p>\n\n\n\n<p>PSACR<br>Power sum ACR uses all four wire pairs to obtain the measure of the attenuation-crosstalk ratio. This is a measurement of the difference between PSNEXT and attenuation (insertion loss). The difference is measured in dB, and higher PSACR dB values indicate better cable performance.<\/p>\n\n\n\n<p>PSANEXT<br>Power-Sum Alien Near-End Crosstalk<\/p>\n\n\n\n<p>PSELFEXT<br>Power sum ELFEXT that uses all four wire pairs to obtain a combined ELFEXT performance measurement. This value is the difference between the test signal level and the cross-talk measured at the far end of the cable. A higher PSELFEXT value indicated better cable performance.<\/p>\n\n\n\n<p>Return Loss<br>This measurement provides a measure of the ratio of power transmitted into a cable to the amount of power returned or reflected.<\/p>\n\n\n\n<p>RX<br>Abbreviation for receive<\/p>\n\n\n\n<p>STP<br>Shielded twisted pair; not good for noisy environments\u2026 blocks EMI, has metal foil placed around the wires<\/p>\n\n\n\n<p>Straight-through<br>Transmit and receive signal pairs are aligned end-to-end<\/p>\n\n\n\n<p>straight-through cable<br>The wire pairs in the cable connect to the same pin numbers on each end<\/p>\n\n\n\n<p>TIA\/EIA 568A<br>Wire color guidelines specified under the EIA\/TIA568B standard (developed in 1995)<\/p>\n\n\n\n<p>T568B<br>Wire color guidelines specified under the EIA\/TIA568B standard<\/p>\n\n\n\n<p>TCL<br>Transverse Conversion Loss<\/p>\n\n\n\n<p>TCO<br>Telecommunications outlet<\/p>\n\n\n\n<p>TCTL<br>Transverse Conversion Transfer Loss<\/p>\n\n\n\n<p>Telecommunications Closet<br>The location of the cabling termination points that includes the mechanical terminations and the distribution frames (networking equipment, patch cables, backbone cabling, patch panels)<\/p>\n\n\n\n<p>TIA<br>Telecommunications Industry Association<\/p>\n\n\n\n<p>TR<br>Another name for the telecommunications closet<\/p>\n\n\n\n<p>TX<br>Abbreviation for transmit<\/p>\n\n\n\n<p>Wire-map<br>A graphical or text description of the wire connections from pin to pin<\/p>\n\n\n\n<p>Work Area<br>The location of the computers and printers, patch cables, jackets, computers adapter cables, and fiber jumpers<\/p>\n\n\n\n<p>Workstation or Work Area Outlet (WO)<br>Also called the TO (telecommunications outlet), it&#8217;s used to connect devices to the cable plant. The cable type typically used is CAT3, CAT5, CAT5e, CAT6, CAT6A, and various coaxial cables. Devices typically connected to these outlets are PCs, printers, servers, phones, televisions, and wireless access points.<\/p>\n\n\n\n<p>Switch<br>Forwards a frame it receives directly out the port associated with its destination address (get the MAC address from the data packets) Minimize unneeded data traffic, isolate portions of the network<\/p>\n\n\n\n<p>TCP\/IP<br>Transmission Control Protocol\/Internet Protocol, the protocol suite used for internet works such as the Internet<\/p>\n\n\n\n<p>ThinNet<br>A type of coaxial cable used to connect LANs configured with a bus topology<\/p>\n\n\n\n<p>Token Passing<br>A technique where an electrical token circulates around A network-control of the token enables the user to gain access to the network<\/p>\n\n\n\n<p>Token Ring Hub<br>A hub that manages the passing of the token in a Token Ring network<\/p>\n\n\n\n<p>Token Ring Topology \/ Network<br>A network topology configured in a logical ring that complements the token passing protocol (one failed station causes network shutdown, difficult to reconfigure, diffident to troubleshoot; each system must relay the token, if there is any failure the entire system goes down. It can be hard to determine which one it is.<\/p>\n\n\n\n<p>Topology<br>Architecture of a network<\/p>\n\n\n\n<p>Transport Layer (4th layer)<br>Layer of the OSI reference model that is concerned with message integrity between source and destination<\/p>\n\n\n\n<p>Uplink Port<br>Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable (an X label is on the uplink ports)<\/p>\n\n\n\n<p>Virtual Private Network (VPN)<br>Establishes a secure network connection and is a way to protect your LAN&#8217;s data from being observed by outsiders<\/p>\n\n\n\n<p>VPN<br>Virtual Private Network<\/p>\n\n\n\n<p>Wired network<br>Uses cables and connectors to establish the network connection<\/p>\n\n\n\n<p>Wireless network<br>Uses radio signals to establish the network connection wireless signal can be intercepted easier than wire signals<\/p>\n\n\n\n<p>Wireless Router<br>Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP<\/p>\n\n\n\n<p>Absorption<br>light interaction with the atomic structure of the fiber material; also involves the conversion of optical power to head<\/p>\n\n\n\n<p>Chromatic Dispersion<br>The broadening of a pulse due to different propagation velocities of the spectral components of the light pulse (affects both single mode and multimode fibers)<\/p>\n\n\n\n<p>Cladding<br>Material surrounding the core, which must have a lower index of refraction to keep the light in the core<\/p>\n\n\n\n<p>dense wavelength division multiplexing (DWDM)<br>Incorporates the propagation of several wavelengths in the 1550-nm range for a single fiber<\/p>\n\n\n\n<p>Dispersion<br>Broadening the light pulse as is propagates through a fiber strand (light isn&#8217;t a cause of dispersion, it is affected by dispersion)<\/p>\n\n\n\n<p>Dispersion Compensating Fiber<br>Acts like an equalizer, canceling dispersion effects and yielding close to zero dispersion int he 1550-nm region (developed to increase the transmission capacity of older cabling; allows the use of 1550nm transmission on lines that were designed for 1310nm region)<\/p>\n\n\n\n<p>Distributed Feedback (DFB) Laser<br>A more stable laser suitable for use in DWDM systems<\/p>\n\n\n\n<p>DL<br>Diode Laser<\/p>\n\n\n\n<p>Fiber Bragg Grating<br>A short strand of modified fiber that changes the index of refraction and minimized intersymbol interference<\/p>\n\n\n\n<p>Fiber Cross-connect<br>Optical patch panel used to interconnect fiber cables<\/p>\n\n\n\n<p>Fiber, Light Pipe, Glass<br>Terms used to describe a fiber-optic strand<\/p>\n\n\n\n<p>FTTB<br>Fiber to business<\/p>\n\n\n\n<p>FTTC<br>Fiber to the curb<\/p>\n\n\n\n<p>FTTD<br>Fiber to the desktop<\/p>\n\n\n\n<p>FTTH<br>Fiber to the home<\/p>\n\n\n\n<p>Fusion splicing<br>A long-term method where two fibers are fused or welded together into one piece of glass<\/p>\n\n\n\n<p>GBIC<br>Gigabit interface converter (optical-to-fiber interfaced used at 1 gigabit)<\/p>\n\n\n\n<p>Graded-index Fiber<br>The index of refraction is gradually varied with a parabolic profile (overcomes modal dispersion)<\/p>\n\n\n\n<p>IC<br>Interconnect fibers branch exchange-item D shows the jumpers connecting the main fiber cross-connect (item B) to the active equipment (item C)<\/p>\n\n\n\n<p>IDC<br>Intermediate Distribution Closet<\/p>\n\n\n\n<p>Index-matching Gel<br>A jelly like substance that has an index of refraction much closer to glass than to air<\/p>\n\n\n\n<p>Infrared Light<br>Light extending from 680 nm up to the wavelengths of the microwaves<\/p>\n\n\n\n<p>Isolator<br>An inline passive device that allows optical power to flow only in one direction<\/p>\n\n\n\n<p>LED<br>Light-emitting diode<\/p>\n\n\n\n<p>Logical Fiber Map<br>Shows how the fiber is interconnected and data is distributed throughout a campus (data distribution, fiber interconnections)<\/p>\n\n\n\n<p>Long Haul<br>The transmission of data over hundreds or thousands of miles<\/p>\n\n\n\n<p>Macrobending<br>Loss due to light breaking up and escaping into the cladding<\/p>\n\n\n\n<p>Mechanical splices<br>Two fibers joined together with an air gap, thereby requiring an index-matching gel to provide a good splice<\/p>\n\n\n\n<p>Microbending<br>Loss caused by verry small mechanical deflections and stress on the fiber<\/p>\n\n\n\n<p>MM<br>Multimode<\/p>\n\n\n\n<p>Modal Dispersion<br>The broadening of a pulse due to different path lengths taken through the fiber by different modes<\/p>\n\n\n\n<p>Mode Field Diameter<br>The actual guided optical power distribution, which is typically a micron or so larger than the core diameter; single-mode fiber specifications typically list the mode field diameter<\/p>\n\n\n\n<p>Multimode Fiber<br>A fiber that supports many optical waveguide modes; use light in the 850 nm and 1310 nm range<\/p>\n\n\n\n<p>Numerical Apeture<br>A measure of a fiber&#8217;s ability to accept light<\/p>\n\n\n\n<p>Optical Ethernet<br>Ethernet data running over a fiber link<\/p>\n\n\n\n<p>Optical spectrum<br>Light frequencies from the infrared on up<\/p>\n\n\n\n<p>Physical Fiber Map<br>Shows the routing of the fiber but also shows detail about the terrain, underground conduit, and entries into buildings<\/p>\n\n\n\n<p>Polarization mode Dispersion<br>The broadening of a pulse due to the different propagation velocities of the X and Y polarization components of the light pulse<\/p>\n\n\n\n<p>Pulse Dispersion<br>Stretching of received pulse width because of multiple paths taken by the light<\/p>\n\n\n\n<p>Received Signal Level (RSL)<br>The input signal level to an optical receiver<\/p>\n\n\n\n<p>Refractive Index<br>Ratio of the speed light in free space to its speed in a given material<\/p>\n\n\n\n<p>SC, ST, FC, LC, MT-RJ<br>Typical fiber connectors on the market (need to be easy to install and economical)<\/p>\n\n\n\n<p>Scattering<br>Caused by refractive index fluctuations; accounts for 96 percent of attenuation loss<\/p>\n\n\n\n<p>Single-mode Fiber<br>Fiber cables with core diameters of about 7-10 um; light follows a single path (use light in the 1310 nm and 1550 nm range) Uses high-power, highly directional modulated light sources; single-mode fibers are used with lasers.<\/p>\n\n\n\n<p>SM<br>Single mode<\/p>\n\n\n\n<p>SONET\/SDH<br>Synchronous optical network; protocol standard for optical transmission in long-haul communication\/synchronous digital hierarchy<\/p>\n\n\n\n<p>STS<br>Synchronous transport signals<\/p>\n\n\n\n<p>Tunable Laser<br>Laser in which the fundamental wavelength can be shifted a few nanometers, ideal for traffic routing in DWDM systems<\/p>\n\n\n\n<p>Vertical Cavity Surface Emitting Lasers (VCSELs)<br>Lasers with the simplicity of LEDs and the performance of lasers<\/p>\n\n\n\n<p>XENPAK, XPAK, X2, XFP, SFP+<br>The ten gigabit interface adapter<\/p>\n\n\n\n<p>Zero-dispersion Wavelength<br>Point where the dispersion is actually zero<\/p>\n\n\n\n<p>Aging Time<br>The length of time a MAC address remains assigned to a port; length of time an IP address is assigned to a switchport<\/p>\n\n\n\n<p>ARP Cache<br>Temporary storage of MAC addresses recently contacted<\/p>\n\n\n\n<p>ARP Table<br>Another name for the ARP cache<\/p>\n\n\n\n<p>Association<br>Indicates that the destination address is for an networking device connected to one of the ports on the bridge (describes a wireless connection and MAC address: wireless connection has been obtained, provides the client MAC address)<\/p>\n\n\n\n<p>AUI Port<br>This is a 10Mbps Ethernet port. AUI stands for &#8220;attachment unit interface.&#8221;<\/p>\n\n\n\n<p>Auto-negotiation<br>Protocol used by interconnected electronic devices to negotiate a link speed (failed negotiation can cause a link failure, not recommended for fixed data links) The link can only go as fast as the slowest link.<\/p>\n\n\n\n<p>Auxiliary Input<br>Used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection<\/p>\n\n\n\n<p>Bridge<br>A networking device that uses the MAC address to forward data and interconnect two LANs (easy to install) Only forwards data to the specified port, isolated the network traffic, uses MAC addresses to forward data packets. The association tells the bridge where to forward a data packet. Works on the Data Link layer (layer 2)<\/p>\n\n\n\n<p>Bridging Table<br>List of MAC addresses and port locations for hoses connected to the bridge ports<\/p>\n\n\n\n<p>Broadcast<br>Transmission of data by a network device to all devices connected to its ports<\/p>\n\n\n\n<p>Broadcast Domain<br>Any network broadcast sent over the network will be seen by all networking devices in this domain<\/p>\n\n\n\n<p>Broadcast Storm<br>Excessive amounts of broadcasts; can cause network slowdown<\/p>\n\n\n\n<p>Cisco Network Assistant (CNA)<br>A management software tool from Cisco that simplifies switch configuration and troubleshooting<\/p>\n\n\n\n<p>Console Input<br>Provides a RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable uses RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the COM1 or COM2 serial port<\/p>\n\n\n\n<p>Content Addressable Memory (CAM)<br>A table of MAC addresses and port mapping used by the switch to identify connected networking devices<\/p>\n\n\n\n<p>cut-through switching<br>The data packet is forwarded to the destination as soon as the destination MAC address has been read; cut thought switching doesn&#8217;t read the entire frame, just the MAC address. Low latency<\/p>\n\n\n\n<p>Dynamic Assignment \/ Addressing<br>MAC addresses are assigned to a port when a host is connected (addresses are assigned dynamically when using dynamic addressing)<\/p>\n\n\n\n<p>Enterprise Network<br>Term used to describe the network used by a large company<\/p>\n\n\n\n<p>Error Threshold<br>The point where the number of error in the data packets has reached a threshold and the switch changes from the cut-through to the store-and-forward mode<\/p>\n\n\n\n<p>Fast Link Pulse (FLP)<br>Carries the configuration information between each end of a data link (designed to operate over limited bandwidth)<\/p>\n\n\n\n<p>FastEthernet Port (FA0\/0, FA0\/1, FA0\/2,\u2026)<br>Naming of the FastEthernet ports on the router<\/p>\n\n\n\n<p>Flooding<br>The term used to describe what happens when a switch doesn&#8217;t have the destination MAC address stored in CAM<\/p>\n\n\n\n<p>Gateway<br>Describes the networking device that enables hosts in a LAN to connect to networks (and hosts) outside the LAN<\/p>\n\n\n\n<p>Half-Duplex<br>The communications device can transmit or receive but not at the same time<\/p>\n\n\n\n<p>Isolating the Collision Domains<br>Breaking the network into segments where a segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices<\/p>\n\n\n\n<p>Layer 2 Switch<br>An improved network technology that provides a direct data connection for network devices in a LAN<\/p>\n\n\n\n<p>Logical Address<br>Describes the IP address location of the network and the address location of the host in the network<\/p>\n\n\n\n<p>Managed Switch<br>Allows the network administrator to monitor, configure, and manage select network features (managed switches can be managed remotely)<\/p>\n\n\n\n<p>Media Converter<br>Used to adapt a layer 1 (physical layer) technology to another layer 1 technology<\/p>\n\n\n\n<p>Multicast<br>Messages are sent to a specific group of hosts on the network<\/p>\n\n\n\n<p>Multilayer Switch (MLS)<br>Operates at layer 2 but functions at the higher layers<\/p>\n\n\n\n<p>Multiport Bridge<br>Another name for a layer 2 switch<\/p>\n\n\n\n<p>Network Address<br>Another name for the layer 3 address (routers use the network address to route packets)<\/p>\n\n\n\n<p>Network Slowdown<br>Degraded network performance<\/p>\n\n\n\n<p>Power On\/Off<br>Turns on\/off electrical power to the router<\/p>\n\n\n\n<p>Router Interface<br>The physical connection where the router connects to the network; serial, Ethernet, and auxiliary can all be used to connect to the network.<\/p>\n\n\n\n<p>Routing Table<br>Keeps track of the routes to use for forwarding data to its destination<\/p>\n\n\n\n<p>Secure Address<br>The switch port will automatically disable itself if a device with a different MAC address connects to the port<\/p>\n\n\n\n<p>Serial Ports<br>Provides a serial data communication link into and out of the router, using V.35 serial interface cables<\/p>\n\n\n\n<p>Store-and-Forward<br>The entire frame of data is received before any decision is made regarding forwarding the data packet to its destination<\/p>\n\n\n\n<p>Switch Latency<br>The length of time a data packet takes from the time it enters a switch until it exits.<\/p>\n\n\n\n<p>Translation Bridge<br>Used to interconnect two LANs that are operating two different networking protocols<\/p>\n\n\n\n<p>Transparent Bridge<br>Interconnects two LANs running the same type of protocol<\/p>\n\n\n\n<p>Wire Speed Routing<br>Data packets are processed as quickly as they arrive<\/p>\n\n\n\n<p>Access Point<br>A transceiver used to interconnect a wireless and a wired LAN (looks as the SSID to determine if the data packet is intended for it&#8217;s network)<\/p>\n\n\n\n<p>Ad Hoc<br>Another term used to describe an independent network<\/p>\n\n\n\n<p>Backscatter<br>Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.<\/p>\n\n\n\n<p>Basic Service Set (BSS)<br>Term used to describe an independent network<\/p>\n\n\n\n<p>Beacon<br>Used to verify the integrity of a wireless link<\/p>\n\n\n\n<p>BWA<br>Broadband wirless access<\/p>\n\n\n\n<p>CSMA\/CA<br>Carrier sense multiple access\/collision avoidance<\/p>\n\n\n\n<p>DSSS<br>Direct Sequence Spread Spectrum<\/p>\n\n\n\n<p>Extended Service Set (ESS)<br>The use of multiple access points to extend user mobility. (allows a wider range of wireless signals using roaming)<\/p>\n\n\n\n<p>FHSS<br>Frequency Hopping Spread Spectrum<\/p>\n\n\n\n<p>Hand-off<br>When the user&#8217;s computer establishes an association with another access point<\/p>\n\n\n\n<p>Hopping Sequence<br>The order of frequency changes<\/p>\n\n\n\n<p>Inquiry Procedure<br>Used by Bluetooth to discover other Bluetooth devices or to allow itself to be discovered<\/p>\n\n\n\n<p>ISM<br>Industrial, scientific, and medical<\/p>\n\n\n\n<p>Last Mile<br>The last part of the connection from the telecommunications provider to the customer<\/p>\n\n\n\n<p>MIMO<br>A space-division multiplexing technique where the data stream is split into multiple parts called spatial streams (uses space-division multiplexing to transmit different data streams in parallel)<\/p>\n\n\n\n<p>NLOS<br>Non-line-of-sight<\/p>\n\n\n\n<p>OFDM<br>Orthogonal Frequency Division Multiplexing<\/p>\n\n\n\n<p>Paging Procedure<br>Used to establish and synchronize a connection between two Bluetooth devices<\/p>\n\n\n\n<p>Pairing<br>When a Bluetooth device is set up to connect to another Bluetooth device<\/p>\n\n\n\n<p>Passkey<br>Used in Bluetooth Security to limit outsider access to the pairing<\/p>\n\n\n\n<p>Piconet<br>An ad hoc network of up to eight Bluetooth devices<\/p>\n\n\n\n<p>Pseudorandom<br>The number sequence appears random but actually repeats<\/p>\n\n\n\n<p>Radio Frequency Identification (RFID)<br>A technique that uses radio waves to track and identify people, animals, objects, and shipments (full speed tollbooths, tracking shipments, border crossing) Parameters that define an RFID system is frequency of operation, power, and protocol<\/p>\n\n\n\n<p>RADIUS<br>Remote Authentication Dial-In User Service (prevents unauthorized users to connect to the network as well as preventing users from connecting to rogue access points)<\/p>\n\n\n\n<p>Roaming<br>The term used to describe a user&#8217;s ability to maintain network connectivity as he moves through the workplace<\/p>\n\n\n\n<p>Site Survey<br>Performed to determine the best location(s) for placing the access point(s) to provide maximum RF coverage for the wireless clients (conducted both inside and outside)<\/p>\n\n\n\n<p>Slotted Aloha<br>A wireless network communications protocol technique similar to the Ethernet protocol<\/p>\n\n\n\n<p>Transceiver<br>A transmit\/receive unit<\/p>\n\n\n\n<p>U-NII<br>Unlicensed National Information Infrastructure<\/p>\n\n\n\n<p>Wi-Fi<br>Wi-Fi Alliance(md) and organization that tests and certifies wireless equipment for compliance with the 802.11x standards<\/p>\n\n\n\n<p>WiMAX<br>A broadband wireless system based on the IEEE 802.16e standard (30 mile max range)<\/p>\n\n\n\n<p>WLAN<br>Wireless Local Area Network<\/p>\n\n\n\n<p>WPA<br>Wi-Fi Protected Access<\/p>\n\n\n\n<p>The Transport Layer (4th layer)<br>The transport layer protocols in TCP\/IP are very important in establishing a network connection, managing the delivery of data between a source and destination host, and terminating the data connection (TCP and UDP are the only protocols on the Transport layer).<\/p>\n\n\n\n<p>HTTP Port number<br>80<\/p>\n\n\n\n<p>Bluetooth<br>Operates in the 2.4 GHz band; 802.11n, 802.11b, 802.11g (802.11a operated in the 5GHz range)<\/p>\n\n\n\n<p>Core size of multimode cables<br>62.5<\/p>\n\n\n\n<p>Patch Cable<br>Used to make the physical connection to the wall palate<\/p>\n\n\n\n<p>Stretching of a received pulse is due to<br>Pulse-dispersion and Multiple Paths taken by the light waves<\/p>\n\n\n\n<p>EIA\/TIA568-b.2 and 568-2.1<br>Specify the cabling components and transmission of copper cabling hardware<\/p>\n\n\n\n<p>10.10.20.250<br>Example of a private IP address, a nonreturnable Internet IP address, Class A address<\/p>\n\n\n\n<p>Antivirus software<br>Signatures or definitions contain traits of the specific virus or worm<\/p>\n\n\n\n<p>MAC address filtering<br>Only devices with specified layer 2 addresses will be allowed to access the network\u2026 lets you specify which devices can connect to the network<\/p>\n\n\n\n<p>10101010<br>Decimal equivalent of 170<\/p>\n\n\n\n<p>Wireless Access Point<br>Provide MAC functions to allow users to connect to each other; provides 802.11 MAC layer functions<\/p>\n\n\n\n<p>Cisco LEAP<br>User must provide the correct passwod<\/p>\n\n\n\n<p>Router Routing tables<br>Keep track of the addresses needed to route data. Contains addresses of adjacent routers and the networks that they can reach. It also includes the metric and method of learning the route. Use the ip route command to the the routing table.<\/p>\n\n\n\n<p>Maximum length for multimode fiber optic cable<br>2000 meter or 2 km<\/p>\n\n\n\n<p>wired networks<br>can have data rates as high as 100Gbps<\/p>\n\n\n\n<p>no ip directed-broadcast network command<br>Prevents networks from becoming intermediate sites for network attacks. On a Cisco router prevents a network form becoming an intermediate site for a network attack<\/p>\n\n\n\n<p>Hexadecimal equivalent of 1011<br>B = 1011 = 11<\/p>\n\n\n\n<p>Serial Interface<br>Used to create a T1 connection; sometimes has a built-in CSU\/DSU<\/p>\n\n\n\n<p>802.11 technologies<br>Don&#8217;t use visible light; use FHSS, DSSS, infrared<\/p>\n\n\n\n<p>Secure a wireless home network<br>Turn on encryption; turning on WEP, WPA or WPA-2 will encrypt the data<\/p>\n\n\n\n<p>Class c usable IP network addresses<br>192.0.0.0 &#8211; 223.255.255.255 (there are 24 network bits; the first three octets are used with 24 bits total)<\/p>\n\n\n\n<p>150.25.191.255<br>broadcast address for 150.25.151.68 with a mask of 255.255.192.0<\/p>\n\n\n\n<p>How many wire pairs are used for gigabit Ethernet<br>4: all 4 wire pairs are used for transmission at 1 Gbps speeds<\/p>\n\n\n\n<p>Wireless security guidelines<br>Use firewalls, turn on access point security features. Technology in any frequency band may be used and 3rd party tools must be used end-to-end.<\/p>\n\n\n\n<p>Network Segment<br>A segment is associated with each networking device; the networking link between 2 LANs<\/p>\n\n\n\n<p>Intrusion detection<br>the monitoring of data packets passing through the network to catch potential attacks; the monitoring of data packets passing through the network to catch ongoing attacks. The first issue of intrusion is Social Engineering.<\/p>\n\n\n\n<p>Private IP address<br>Cannot be used on the Internet, only Intranets<\/p>\n\n\n\n<p>OC-3 bit rate<br>155.52 Mbps<\/p>\n\n\n\n<p>UTP wire pair length difference<br>can be due to poor manufacturing, can be due to inconsistent twists, cause the cable not to be certified\u2026 cable testing will reveal these issues. The inconsistent length can cause failure if one wire is over 100 meters while the others are not. Due to the difference in the cable twists for each wire pair.<\/p>\n\n\n\n<p>255.255.255.224<br>Expressed as a \/27 using CIDR notation because there are 27 1s in the subnet mask<\/p>\n\n\n\n<p>192.168.55.0 dived into multiple subnets, need at lest 30 host ID&#8217;s in each subnet; maximum number of subnets you could have?<br>8: Class C address and we must use 5 bits for our hoses (2 to the 5th -2 = 30 hosts). That leaves 3 bits to use for subnets. 2 to the 3rd = 8 subnets<\/p>\n\n\n\n<p>Probing<br>Indicators of repeated attempts to make connections to certain machines<\/p>\n\n\n\n<p>Core<br>Carries the light signals in a fiber optic cable<\/p>\n\n\n\n<p>Static Assignment<br>MAC address that has been manually assigned<\/p>\n\n\n\n<p>SMTP Port Number<br>25<\/p>\n\n\n\n<p>Router<br>Interconnect LANs; routers know where to send packets coming into or leaving the LAN; router ports commonly refereed to as interfaces which provide the physical connection to the network. Operates at the Network Layer (layer 3)<\/p>\n\n\n\n<p>Ethernet (DIX) frame after the Preamble<br>Destination address, Source address, Type\/Length, Data, Pad, FCS<\/p>\n\n\n\n<p>Fiber optic communication system<br>Source, cable, connectors, photodiode\u2026 the link may have splices but it must have connectors<\/p>\n\n\n\n<p>255.255.255.252.0<br>Expressed as \/22 using CIDR notion because there are 22 1s in the subnet mask<\/p>\n\n\n\n<p>well-known ports<br>ICANN reserves these ports for particular protocols<\/p>\n\n\n\n<p>SYN Flood<br>Attackers send SYN packets to set up virtual connections that use up the connection buffer\u2026 denial-of-service attack characterized by using all connections available on a computer<\/p>\n\n\n\n<p>How many usable host IP addresses are provided: network IP address of 192.168.12.0 and a subnet mask of 255.255.255.252<br>2<\/p>\n\n\n\n<p>Telnet Port<br>23<\/p>\n\n\n\n<p>DSL Modem<br>Used to connect to a broadband network through your telephone connection only. Broadband modems can connect using cable or telephone technology.<\/p>\n\n\n\n<p>Physical Architecture of a computer network<br>Topologies, A physical topology is the actual layout of the network.<\/p>\n\n\n\n<p>SLA ID<br>Used to identify subnets in an IPv6 address<\/p>\n\n\n\n<p>802.11u<br>802.11x standard increases security by incorporating user authentication, not 802.11u<\/p>\n\n\n\n<p>Correct order sequence of packets that are sent to set up a virtual TCP connection<br>The three-way handshake is used to create virtual TCP connections: SYN, SYN-ACK, ACK<\/p>\n\n\n\n<p>802.11g advantage<br>Compatible with 802.11b, high speed<\/p>\n\n\n\n<p>What tools are needed to make a UTP cable?<br>Crimping Tool and strippers are used to terminate UTP cables<\/p>\n\n\n\n<p>FTP Port Number<br>21<\/p>\n\n\n\n<p>Layered Protocol Specifications<br>Multi vendor interoperability, easier to develop, easier to learn; Multivendor engineering not a benefit because doesn&#8217;t specify how it should work, just what it needs to be able to do.<\/p>\n\n\n\n<p>Designing a LAN<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>document all devices 2. develop and addressing scheme, physically connect devices and configure devices to communicate<\/li>\n<\/ol>\n\n\n\n<p>With an address of 197.15.22.31 and a subnet mask of 255.255.255.224 how many bits have been borrowed to create a subnet?<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>224 = 11100000, 3 bits on<\/li>\n<\/ol>\n\n\n\n<p>Light detector characteristics<br>Responsivity, response speed, spectral response<\/p>\n\n\n\n<p>Decimal equivalent of 11110000<br>240<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is a network of users that share computer resources in a limited area.LAN Local Area NetworkLAN How are Local Area Networks defined?In terms of protocol and the topology used for accessing the network. A set of rules established for users to exchange informationProtocol The network architecture used to interconnect the networking equipment.Topology What are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-110262","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=110262"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110262\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=110262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=110262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=110262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}