100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C172 WGU COMPLETE V3 STUDY GUIDE AN A+ STUDY SOLUTION 2023.

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
03-04-2025
Written in
2024/2025

C172 WGU COMPLETE V3 STUDY GUIDE AN A+ STUDY SOLUTION 2023. "Biometric Systems - CORRECT ANSWER Systems that measure and analyze specific characteristics of the human body for the purpose of authentication" "FERPA (Family Educational Rights and Privacy Act) - CORRECT ANSWER federal law that requires all educational institutions to protect the privacy of student education records" "FISMA (Federal Information Security Management Act) - CORRECT ANSWER a federal law that was developed to protect government information, operations, and assets against security threats" "GLBA (Gramm-Leach-Bliley Act) - CORRECT ANSWER federal law that requires all financial institutions to protect customer financial information data, to safeguard the financial information against security threats, and to deny any unwarranted access to financial data" "HIPAA (Health Insurance Portability and Accountability Act) - CORRECT ANSWER federal law that requires all health-related agencies to protect the personally identifiable information (PII) of patients" "MLA (Master license agreement) - CORRECT ANSWER defines the owner rights, terms, and conditions related to intellectual property" "NDA (Non-Disclosure Agreement) - CORRECT ANSWER a legal agreement to bind a party or parties to not disclose or share specific information" "SOW (Statement of work) - CORRECT ANSWER a document often used in conjunction with an MSA that contains all the specifics of the service; includes deliverables, schedules, responsibilities" "AUP (Acceptable Use Policy) - CORRECT ANSWER outlines the acceptable use of IT equipment and related services" "incident response policy - CORRECT ANSWER 1. preparation 2. identification 3. containment 4. eradication 5. recovery 6. follow-up" "privileged user agreement - CORRECT ANSWER establishes expectations for the conduct of individuals granted privileged access to an organization's enterprise systems and services" "differential backup - CORRECT ANSWER includes all data that has changed since the last full backup" "incremental backup - CORRECT ANSWER only include data that has changed since the previous backup copy; takes the least time and the least storage space" "HA (High Availability) - CORRECT ANSWER describes systems that are in continuous operation for a long time, with minimal downtime" "cold site - CORRECT ANSWER empty facility with only power and cooling, but no equipment or racks" "hot site - CORRECT ANSWER full-blown operational facility with power, cooling, and equipment racked and powered up and connected to the network; a duplicate of the current data center" "Hypervisor - CORRECT ANSWER Software that is used for managing and controlling the underlying physical hardware and associated virtual hardware" "Virtual machine monitor - CORRECT ANSWER VMM" "Type 1 Hypervisor (bare-metal hypervisor) - CORRECT ANSWER A hypervisor that is loaded directly on hardware to abstract the hardware to the virtualization layer and that is commonly used on servers" "Type 2 Hypervisor (hosted hypervisor) - CORRECT ANSWER A hypervisor that is loaded on an operating system and abstracts the virtualization layer through its host operating system and is commonly used on personal computers" "Cloud - CORRECT ANSWER Another name for Internet-based services" "Outsourcing - CORRECT ANSWER Obtaining goods or services from an outside source rather than an internal source" "cloud computing (cloud service) - CORRECT ANSWER An outsourced and hosted computing environment that delivers IT services to users via a network" "MX (mail exchange) record - CORRECT ANSWER The mail exchange record, which points to the incoming email servers of the organization" "CNAME record (canonical name record) - CORRECT ANSWER used to specify that a domain name is an alias for another domain (alias for a hostname)" "IaaS (Infrastructure as a Service) - CORRECT ANSWER A service that focuses on the facilities and infrastructure in the data center and the virtualization and abstraction layer that exists on top of the physical facilities and infrastructure" "PaaS (Platform as a Service) - CORRECT ANSWER A service that focuses on application development on any desired platform utilizing cloud computing" "Fibre Channel (FC) - CORRECT ANSWER The original high-speed technology used to connect data storage to servers; uses fiber-optic cables to connect storage devices into a network" "IB (Infiniband) - CORRECT ANSWER A technology that provides high performance and high throughput with low latency; fastest storage interface, with speed of 200Gbps" "FCoE (Fibre Channel over Ethernet) - CORRECT ANSWER A technology that encapsulates Fibre Channel frames over Ethernet networks allowing FC to use 10Gbps (or higher) Ethernet networks while preserving the FC protocol; jumbo frame supported" "iSCSI (Internet Small Computer Systems Interface) - CORRECT ANSWER technology that enables the SCSI protocol to communicate over IP networks" "NAS (Network Attached Storage) - CORRECT ANSWER a file-level storage device that can be accessed on a network; available on FTP, NFS, AFP, SMB" "Social Engineering - CORRECT ANSWER A process by which an intruder obtains enough information from people to gain access to the network" "Password Cracking - CORRECT ANSWER An attack in which the attacker tries to guess the user's password" "Dictionary Attack - CORRECT ANSWER An attack that uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to an account" "Brute-Force Attack - CORRECT ANSWER An attack in which the attacker uses every possible combination of characters to guess the password" "Packet Sniffing - CORRECT ANSWER A technique in which the contents of data packets are watched" "IPSec (Internet Protocol Security) - CORRECT ANSWER layer 3 protocol in which each packet is encrypted prior to transmission across the network link" "Man-in-the-Middle - CORRECT ANSWER An attack in which an attacker can seamlessly place itself in the middle of a conversation between others in order to become the recipient of all information sent by victim computers" "netstat -a - CORRECT ANSWER The command used to display the ports currently open on a Windows operating system" "netstat -b - CORRECT ANSWER The command used to display the executable involved in creating the connection or listening port" "nmap - CORRECT ANSWER A Linux and Windows port scanner" "Penetration Testing - CORRECT ANSWER Evaluating the security of a user's network by trying to exploit vulnerabilities" "Virus - CORRECT ANSWER A piece of malicious computer code that, when opened, can damage hardware, software, or other files" "Worm - CORRECT ANSWER A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks" "Malware (Malicious Software) - CORRECT ANSWER any program intended to harm, disrupt, deny, or gain unauthorized access to a computing system" "Zero-Day Attack - CORRECT ANSWER An attack that exploits a software vulnerability that is unknown to the developer" "DoS (Denial of Service) - CORRECT ANSWER An attack in which service is denied to a computer, network, or server" "access-list permit ip any any - CORRECT ANSWER The instruction added to the last line of an access list to allow all other data packets to enter and exit the router" "DMZ (Demilitarized Zone) - CORRECT ANSWER An area used to isolate servers" "Packet Filtering - CORRECT ANSWER Protection in which a limit is placed on the information that can enter the network" "Proxy Server - CORRECT ANSWER A setup in which clients go through a proxy to communicate with secure systems" "Stateful Firewall - CORRECT ANSWER A firewall that keeps track of data packet flow" "IDS and IPS (Intrusion Detection System; Intrusion Prevention System) - CORRECT ANSWER Systems that identify misuse and anomalies on a network" "Packet Shaper - CORRECT ANSWER A device that sits between a campus network and an outside network and is configured with a set of rules that are used to prioritize data traffic for shaping the bandwidth" "Authentication, Authorization, and Accounting (AAA) - CORRECT ANSWER A framework developed to control access to computing resources, enforce policies, and audit usage" "IP Tunnel - CORRECT ANSWER creates a virtual circuit between two endpoints and makes the connection appear like a dedicated connection even though it spans over the Internet infrastructure" "GRE (Generic Routing Encapsulation) - CORRECT ANSWER A tunneling protocol developed by Cisco and is commonly used as a site-to-site VPN" "PAP (Password Authentication Protocol) - CORRECT ANSWER simple, unencrypted authentication method; commonly used by PPP for authentication" "CHAP (Challenge Handshake Authentication Protocol) - CORRECT ANSWER encrypted authentication method that uses the MD5 file hashing algorithm; commonly used by PPP for authentication" "Message Digest 5 - CORRECT ANSWER MD5" "SHA (Secure Hash Algorithm) - CORRECT ANSWER A cryptographic hash algorithm used in certain government applications" "Extensible Authentication Protocol - CORRECT ANSWER EAP" "Secure Hash Algorithm - CORRECT ANSWER SHA-1" "DES, 3DES, AES (Data Encryption Standard, Triple Data Encryption Standard, Advanced Encryption Standard) - CORRECT ANSWER symmetrical encryption algorithms" "IKE (Internet Key Exchange) - CORRECT ANSWER 2-phase protocol used by IPSec to create a master key, which in turn is used to generate bulk encryption keys for encrypting data." "Internet Security Association and Key Management Protocol - CORRECT ANSWER ISAKMP" "Diffie-Hellman - CORRECT ANSWER Key generation algorithm" "Jamming - CORRECT ANSWER The wireless network is overwhelmed with wireless traffic" "Beacon - CORRECT ANSWER Used to identify a wireless link" "Open Authentication - CORRECT ANSWER Basically a null authentication that can enable any client to authenticate to an AP" "AES (Advance Encryption Standard) - CORRECT ANSWER encryption algorithm used by WPA2" "CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) - CORRECT ANSWER key management used by WPA2" "LEAP - CORRECT ANSWER A wireless security system used by Cisco" "War Drive - CORRECT ANSWER A process in which attackers search for locations with an open wireless network or a weak wireless network, so that they can gain more access to collect information or data of connecting users" "War Chalking - CORRECT ANSWER This is the next step after war drive, which is to leave marks or symbols to notify other hackers about the wireless vulnerabilities of the location." "probing - CORRECT ANSWER Indicators of repeated attempts to make connections to certain machines" "signature - CORRECT ANSWER indicators of known attacks" "single sign-on (SSO) - CORRECT ANSWER Using one authentication credential (token/ticket) to access multiple accounts or applications." "Wide Area Network (WAN) - CORRECT ANSWER A network that uses the telecommunications network to interconnect sites that are geographically distributed throughout a region, a country, or the world" "High-speed serial interface - CORRECT ANSWER HSSI" "optical carrier - CORRECT ANSWER OC" "DS-0 to DS-3; T1 to T3 - CORRECT ANSWER Common telecommunication data rates" "digital signal - CORRECT ANSWER DS" "Telco - CORRECT ANSWER The local telephone company" "Telco Cloud - CORRECT ANSWER The telecommunications carrier's switched network used to transport data to its destination; also the interconnected networks on the Internet" "Multiplexed - CORRECT ANSWER Combined data packets for transport" "Point of Presence (POP) - CORRECT ANSWER The point where a customer connects network data traffic to a telecommunications carrier" "Line of Demarcation (demarc) - CORRECT ANSWER The point where ownership of telecommunications equipment changes from the telecommunications carrier to the user" "V.44/V.34 - CORRECT ANSWER The standard for all analog modem connections with a maximum data rate of up to 33.6Kbps" "V.92/V.90 - CORRECT ANSWER The standard for a combination analog and digital modem connection with a maximum data rate of 56Kbps" "Asymmetric Operation - CORRECT ANSWER Modem operation in which the data transfer rates to and from the service provider differ" "Cable Modem - CORRECT ANSWER A modem that can use the high bandwidth of a cable television system to deliver high-speed data to and from the service provider" "DOCSIS (Data Over Cable Service Interface Specification) - CORRECT ANSWER international standard that enables high-speed data transfers over the cable system" "Ranging - CORRECT ANSWER A technique that cable modems use to determine the time it takes for data to travel to the cable head end" "xDSL - CORRECT ANSWER A generic representation of the various DSL technologies that are available" "DSL (digital subscriber line) - CORRECT ANSWER high-speed Internet access technology that uses existing copper telephone lines to carry data" "ADSL (Asymmetric DSL) - CORRECT ANSWER max upstream bandwidth 1.544Mbps (from user to the service provider); max downstream bandwidth 8Mbps (from service provider to user); distance limitation of 18,000 ft" "Discrete Multitone (DMT) - CORRECT ANSWER A multicarrier data modulation technique used to transport digital data over copper telephone lines" "remote access server - CORRECT ANSWER A server that runs communications services that enable remote users to log on to a network." "Client - CORRECT ANSWER A computer connected to a network that accesses services from the server" "Peer - CORRECT ANSWER A computer that uses and provides resources to a network" "Peer-to-Peer Network - CORRECT ANSWER A network in which all computers in the network provide similar services, including server functions" "Client/Server Network - CORRECT ANSWER A network in which the server handles multiple requests from multiple clients for multiple services" "Metro Ethernet (Metropolitan Ethernet) - CORRECT ANSWER An extension of the Ethernet infrastructure beyond the internal network infrastructure" "Carrier Ethernet - CORRECT ANSWER An extension of the Ethernet infrastructure that covers much more than just a metropolitan area" "MEF (Metro Ethernet Forum) - CORRECT ANSWER A nonprofit organization that defines Metro/Carrier Ethernet specifications" "User-Network Interface (UNI) - CORRECT ANSWER The demarcation point between customer equipment and a service provider" "Ethernet Service Definition - CORRECT ANSWER A framework that defines the Ethernet service types" "Ethernet Virtual Connection (EVC) - CORRECT ANSWER An association of two or more UNIs that essentially creates a logical path that connects two or more subscriber sites" "E-Line Service Type (E-Line) - CORRECT ANSWER A service type that provides a point-to-point Ethernet virtual connection between two UNIs" "E-LAN Service Type (E-LAN) - CORRECT ANSWER A service type that provides connectivity to two or more subscriber sites using the same EVC" "E-Tree Service Type (E-Tree) - CORRECT ANSWER A service type that provides more of a hub and-spoke environment or a root-and-leaf environment" "BOOTP (Bootstrap Protocol) - CORRECT ANSWER IP assignment protocol that enables a computer to discover its own IP address" "Unicast - CORRECT ANSWER A transmission in which a packet has a fixed destination" "MT Discover - CORRECT ANSWER Message type discover, a DHCP Discover Packet" "MT Offer - CORRECT ANSWER Message type offer, a DHCP offer packet" "MT Request - CORRECT ANSWER Message type request, a DHCP request packet" "MT ACK - CORRECT ANSWER Message type acknowledgement, a DHCP ACK packet" " - CORRECT ANSWER " "Network operations center - CORRECT ANSWER (NOC) A single, centralized area for network monitoring and administrative control of systems." "DNS (Domain Name Service) - CORRECT ANSWER The service that translates URLs to IP addresses and vice versa" "Forward DNS (Forward Zone) - CORRECT ANSWER Translation of a name to an IP address" "Reverse DNS (Reverse Zone) - CORRECT ANSWER Translation of an IP address to a name" "Top-level domain - CORRECT ANSWER (TLD)—The suffix, such as .com or .edu, that follows the domain name in a URL." "Country Domain - CORRECT ANSWER Usually two letters, such as .us (United States) or .ca (Canada), that define the location of the domain server for a country" "TXT Record (Text Record) - CORRECT ANSWER A record that is used to hold arbitrary text information of the domain" "SPF (Sender Policy Framework) - CORRECT ANSWER can be used as validation of legitimate sources of email from a domain" "DKIM (domainKeys identified mail) - CORRECT ANSWER provides a way to validate a domain name identity with an associated message through cryptographic authentication" "SRV record (service record) - CORRECT ANSWER identify host(s) offering a specific type of service" "AAAA record (quad-A record) - CORRECT ANSWER DNS record for IPv6" "CBS (committed burst size) - CORRECT ANSWER traffic size that is allowed to burst; it is not discarded or shaped by the profile" "EIR (excess information rate) - CORRECT ANSWER an average rate parameter used to allow traffic greater than the committed information rate to traverse and may deliver it when the network is not congested" "CIR (committed information rate) - CORRECT ANSWER used to guarantee the bandwidth the network must deliver" "EBS (excess burst size) - CORRECT ANSWER the burstable size allowed when the traffic is in the EIR mode" "broadcast domain - CORRECT ANSWER a portion of a network in which any broadcast sent out on the network are seen by all hosts" "flat network - CORRECT ANSWER a network where the LANs share the same broadcast domain" "layer 3 network (routed network) - CORRECT ANSWER uses layer 3 addressing for selecting routes to forward data packets" "default gateway address - CORRECT ANSWER The IP address of the networking device used to forward data that needs to exit the LAN" "next hop address - CORRECT ANSWER The IP address of the next networking device that can be used to forward the data packet to its destination" "physical layer - CORRECT ANSWER layer 1 of the OSI model, which provides the electrical and mechanical connection to the network" "data link layer - CORRECT ANSWER layer 2 of the OSI model, which handles error recover, flow control (synchronization), and sequencing" "network layer - CORRECT ANSWER layer 3 of the OSI model, which accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information" "transport layer - CORRECT ANSWER layer 4 of the OSI model, which is concerned with message integrity between source and destination" "session layer - CORRECT ANSWER layer 5 of the OSI model, which provides the control functions necessary to establish, manage, and terminate the connections" "presentation layer - CORRECT ANSWER layer 6 of the OSI model, which accepts and structures the messages for the application" "mesh topology - CORRECT ANSWER connects all networking devices directly to each other which provides full redundancy in the network paths" "LAN (local area network) - CORRECT ANSWER network of users that share computer resources in a limited area" "topology - CORRECT ANSWER architecture of a network" "token ring topology - CORRECT ANSWER a network topology configured in a logical ring that complements the token passing protocol" "IEEE (Institute of Electrical and Electronics Engineers) - CORRECT ANSWER one of the major standards-setting bodies for technological development" "deterministic - CORRECT ANSWER a type of network in which access to the network is provided at fixed time intervals" "token ring hub - CORRECT ANSWER a hub that manages the passing of the token in a token ring network" "hub (multiport repeater) - CORRECT ANSWER device that broadcasts the data it receives to all devices connected to its ports" "broadcast - CORRECT ANSWER transmission of data by a hub to all devices connected to its ports" "frame - CORRECT ANSWER a format that provides grouping of information for transmission" "NIC (Network Interface Card) - CORRECT ANSWER The electronic hardware used to interface the computer to the network" "MAC address - CORRECT ANSWER a unique 6-byte address assigned by the vendor of a network interface card" "Organizationally Unique Identifier (OUI) - CORRECT ANSWER the first 3 bytes of the MAC address that identifies the manufacturer of the network hardware" "Ethernet, Physical, Hardware, or Adapter Address - CORRECT ANSWER other names for MAC address" "ipconfig /all - CORRECT ANSWER a command that enables the MAC address information to be displayed from the command prompt" "IANA (Internet Assigned Numbers Authority) - CORRECT ANSWER the agency that assigns IP addresses" "IP address - CORRECT ANSWER a unique 32-bit address that identifies on which network a computer is located and differentiates the computer from all other devices on the same network" "network number - CORRECT ANSWER portion of an IP address that defines which network an IP packet is originating from or being delivered to" "host number (host address) - CORRECT ANSWER portion of an IP address that defines the location of a networking device connected to the network" "private addresses - CORRECT ANSWER IP addresses set aside for use in private intranets; blocks 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255." "intranet - CORRECT ANSWER An internal network that provides file and resource sharing but is not accessed from the Internet" "IP Internetwork - CORRECT ANSWER A network that uses IP addressing for identifying devices connected to the network" "TCP/IP (transmission control protocol/internet protocol) - CORRECT ANSWER the protocol suite used for internetworks such as the Internet" "Wi-Fi Alliance - CORRECT ANSWER organization that tests and certifies wireless equipment for compliance with the 802.11x standards" "wireless router - CORRECT ANSWER device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP" "range extender - CORRECT ANSWER device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all" "hotspot - CORRECT ANSWER A limited geographic area that provides wireless access for the public" "SSID (Service Set Identifier) - CORRECT ANSWER A name that is used to identify your wireless network and is used by your access point or wireless router to establish an association" "firewall protection - CORRECT ANSWER A type of protection used to prevent unauthorized access to your network" "RJ-45 (8P8C) - CORRECT ANSWER The 8-pin modular connector used with CAT6/5e/5 cable" "crossover - CORRECT ANSWER Cable in which the transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal on the other device" "straight-through - CORRECT ANSWER An input in which the transmit and receive signal pairs are aligned end-to-end" "uplink port - CORRECT ANSWER A port that allows the connection of a switch to another switch without requiring a crossover cable" "link light - CORRECT ANSWER An indicator on a switch or hub that shows whether the transmit and receive pairs are properly aligned" "link pulses - CORRECT ANSWER Pulses sent by two connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up" "ping - CORRECT ANSWER Command used to test that a device on the network is reachable; uses ICMP" "ICMP (Internet Control Message Protocol) - CORRECT ANSWER verifies that messages are being delivered" "ipconfig - CORRECT ANSWER Command used to display the computer's address" "802.11b - CORRECT ANSWER provides data transfer rates up to 11Mbps, with ranges of 100-150 ft" "802.11ac - CORRECT ANSWER provides single-station data transfer rates of 1.3Gbps and operates in the 5GHz frequency band" "802.11a - CORRECT ANSWER provides data transfer rates up to 54Mbps and an operating range up to 75 feet" "802.11g - CORRECT ANSWER provides data transfer rates up to 54 Mbps and an operating range up to 100ft" "access point - CORRECT ANSWER interconnects wireless devices and provides a connection to the wired LAN" "jumbo frame - CORRECT ANSWER an Ethernet packet size greater than 1500 bytes" "pad field in an Ethernet frame - CORRECT ANSWER is used to bring the total number of bytes up to 64 if the data file is less than 64 bytes" "minimum size of the data payload in an Ethernet frame - CORRECT ANSWER 46 bytes" "EIA (Electronics Industries Alliance) - CORRECT ANSWER trade organization that lobbied for interests of manufacturers of electronics-related equipment" "TIA (Telecommunications Industry Association) - CORRECT ANSWER trade organization representing the telecommunications industry" "physical layer - CORRECT ANSWER describes the media interconnecting networking devices" "campus network - CORRECT ANSWER Interconnected LANs within a limited geographic area" "EIA/TIA 568-B - CORRECT ANSWER The standard that defines the six subsystems of a structured cabling system" "Building Entrance (Entrance Facilities) - CORRECT ANSWER The point where the external cabling and wireless services interconnect with the internal building cabling" "Equipment Room (ER) - CORRECT ANSWER A room set aside for complex electronic equipment such as the network servers and telephone equipment" "Telecommunications Closet (telecommunications room) - CORRECT ANSWER The location of the cabling termination points that includes the mechanical terminations and the distribution frames" "Backbone Cabling - CORRECT ANSWER Cabling that interconnects telecommunications closets in the same building and between buildings" "Horizontal Cabling - CORRECT ANSWER Cabling that extends out from the telecommunications closet into the LAN work area, using a star configuration" "Work Area - CORRECT ANSWER The location of the computers and printers, patch cables, jacks, computer adapter cables, and fiber jumpers" "Main Cross-connect (MC) (main distribution frame (MDF), main equipment room, campus distributor (CD)) - CORRECT ANSWER an area that usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building" "Intermediate Cross-connect (IC; building distributor (BD)) - CORRECT ANSWER the building's connection point to the campus backbone, which links the MC to the horizontal cross-connect (HC)" "Cross-connect - CORRECT ANSWER A space where you are going to take one or multiple cables and connect them to one or more cables or equipment" "Horizontal Cross-connect (HC; aka floor distributors (FDs)) - CORRECT ANSWER the connection between the building distributors and the horizontal cabling to the work area or workstation outlet" "Work Area Outlet (WO; aka telecommunications outlet (TO)) - CORRECT ANSWER the workstation used to connect devices (for example, PCs, printers, servers, phones, televisions, wireless access points) to the cable plant, typically with CAT3, CAT5, CAT5e, CAT6, CAT6a, and various coaxial cables" "8P8C (8 position 8 conductor) - CORRECT ANSWER The proper term for the RJ-45 modular plug" "Patch Cable - CORRECT ANSWER Used to make the physical connection from the computer to the wall plate" "Balanced Mode - CORRECT ANSWER A situation in which neither wire in the wire pairs connects to ground" "Fast Ethernet - CORRECT ANSWER An Ethernet system operating at 100Mbps" "Network Congestion (bottlenecking) - CORRECT ANSWER A slowdown on network data traffic movement" "CAT7/7a and CAT6a - CORRECT ANSWER UTP cable standards that support 10Gbps data rates for a length of 100 meters" "10GBASE-T - CORRECT ANSWER 10Gbps over twisted-pair copper" "EMI - CORRECT ANSWER Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights." "Link - CORRECT ANSWER The point from one cable termination to another" "Crosstalk - CORRECT ANSWER Signal coupling in a cable" "Alien Crosstalk (AXT) - CORRECT ANSWER Unwanted signal coupling from one permanent link to another; considered to be the main electrical limiting parameter for 10 gigabit Ethernet & causes disturbances in the neighboring cable" "F/UTP - CORRECT ANSWER Foil over twisted-pair cabling; provides better security, noise immunity for EMI" "refractive index - CORRECT ANSWER The ratio of the speed of light in free space to its speed in a given material" "infrared light - CORRECT ANSWER Light extending from 680 nm up to the wavelengths of the microwaves; below the frequencies in visible spectrum" "Optical Spectrum - CORRECT ANSWER Light frequencies from the infrared on up" "cladding - CORRECT ANSWER Material surrounding the core of optical fiber, which must have a lower index of refraction to keep the light in the core" "numerical aperture - CORRECT ANSWER A measure of a fiber's ability to accept light" "multimode fiber - CORRECT ANSWER A fiber that supports many optical waveguide modes" "pulse dispersion - CORRECT ANSWER Stretching of received pulse width because of multiple paths taken by the light" "graded-index fiber - CORRECT ANSWER Fiber in which the index of refraction is gradually varied with a parabolic profile" "single-mode fiber - CORRECT ANSWER Fiber cables with core diameters of about 7-10 μm, in which light follows a single path; commonly supports 1310 nm and 1550 nm wavelengths" "long haul - CORRECT ANSWER The transmission of data over hundreds or thousands of miles" "mode field diameter - CORRECT ANSWER The actual guided optical power distribution, which is typically a micron or so larger than the core diameter; typically listed in single-mode fiber specifications" "basic service set (BSS; aka ad hoc) - CORRECT ANSWER Term used to describe an independent network" "access point - CORRECT ANSWER A transceiver used to interconnect a wireless and a wired LAN" "transceiver - CORRECT ANSWER A transmit/receive unit" "ESS (Extended Service Set) - CORRECT ANSWER A network with multiple access points to extend user mobility" "Hand-off - CORRECT ANSWER The process in which a user's computer establishes an association with another access point" "Roaming - CORRECT ANSWER The term used to describe a user's ability to maintain network connectivity while moving through the workplace" "Carrier sense multiple access with collision avoidance - CORRECT ANSWER CSMA/CA" "DSSS (direct-sequence spread spectrum) - CORRECT ANSWER method of transmitting used to spread the transmitted data over a wide bandwidth; uses 14 channels, each consuming 22MHz" "ISM band - CORRECT ANSWER Industrial, scientific, and medical band" "FHSS (frequency-hopping spread spectrum) - CORRECT ANSWER method of transmitting in which the signal frequency changes based on a pseudorandom sequence" "Pseudorandom - CORRECT ANSWER A number sequence that appears random but actually repeats" "Hopping Sequence - CORRECT ANSWER The order of frequency changes" "OFDM (orthogonal frequency-division multiplexing) - CORRECT ANSWER method of digital signal modulation in which a single data stream is split into smaller subchannels to reduce interference and crosstalk" "U-NII (unlicensed national information infrastructure) - CORRECT ANSWER part of the radio frequency spectrum used by 802.11a devices, set aside to support short-range, high-speed wireless data communications" "MIMO (multiple input-multiple output) - CORRECT ANSWER Technology used by 802.11n wireless devices, in which data stream is split into multiple parts called spatial streams and are transmitted using separate antennas" "MU-MIMO (multiuser MIMO) - CORRECT ANSWER technology used by 802.11ac wireless networking, which allows the sending of spatial streams to multiple clients at the same time" "Beamforming - CORRECT ANSWER A technique used to direct transmission of the radio signal to a specific device" "Wi-Fi Alliance - CORRECT ANSWER organization whose function is to test and certify wireless equipment for compliance with the 802.11x standards" "association - CORRECT ANSWER describes a wireless connection that is made" "Site Survey - CORRECT ANSWER A process used to determine the best location(s) for placing the access point(s) to provide maximum RF coverage for wireless clients" "Inquiry Procedure - CORRECT ANSWER Used to determine if other Bluetooth devices are available" "Paging Procedure - CORRECT ANSWER A process used to establish and synchronize a connection between two Bluetooth devices" "Piconet - CORRECT ANSWER An ad hoc network of up to eight Bluetooth devices" "Pairing - CORRECT ANSWER Setting up a Bluetooth device to connect to another Bluetooth device" "Passkey - CORRECT ANSWER A passphrase used in Bluetooth security to limit outsider access to pairing" "WiMAX - CORRECT ANSWER A broadband wireless system based on the IEEE 802.16e standard; operates in two configurations: point-to-point or point-to-multipoint" "broadband wireless access - CORRECT ANSWER BWA" "NLOS - CORRECT ANSWER Non-line-of-sight" "Last Mile - CORRECT ANSWER The last part of the connection from the telecommunications provider to the customer" "Radio Frequency Identification (RFID) - CORRECT ANSWER A technique that uses radio waves to track and identify people, animals, objects, and shipments" "Backscatter - CORRECT ANSWER The reflection of radio waves striking an RFID tag and reflecting back to the transmitter source" "Slotted Aloha - CORRECT ANSWER A wireless network communications protocol similar to the Ethernet protocol" "Campus Network - CORRECT ANSWER A collection of two or more interconnected LANs in a limited geographic area" "segment (subnet, NET) - CORRECT ANSWER a section of a network where data traffic is isolated from bridges, switches, and routers; the networking link between 2 LANs" "Bridge - CORRECT ANSWER A networking device that uses MAC address information to forward data and interconnect LANs" "Bridge Table - CORRECT ANSWER A list of MAC addresses and port locations for hosts connected to the bridge ports" "Association - CORRECT ANSWER An indication that the destination address is for a networking device connected to one of the ports on a bridge" "Broadcast - CORRECT ANSWER A data transmission sent to all connected devices" "ARP (address resolution protocol) - CORRECT ANSWER a protocol used to map an IP address to its MAC address" "Broadcast Storm - CORRECT ANSWER Excessive amounts of broadcasts" "Network Slowdown - CORRECT ANSWER Degraded network performance" "ARP Cache (ARP table) - CORRECT ANSWER Temporary storage of MAC addresses recently contacted" "Transparent Bridge - CORRECT ANSWER A bridge that interconnects two LANs running the same type of protocol" "Translation Bridge - CORRECT ANSWER A bridge that is used to interconnect two LANs that are operating at two different networking protocols" "Layer 2 Switch (multiport bridge) - CORRECT ANSWER An improved network technology that provides a direct data connection for network devices in a LAN" "Multicast - CORRECT ANSWER A situation in which messages are sent to a specific group of hosts on a network" "Managed Switch - CORRECT ANSWER A switch that allows a network administrator to monitor, configure, and manage select network features" "Cisco Network Assistant (CNA) - CORRECT ANSWER A management software tool from Cisco that simplifies switch configuration and troubleshooting" "Dynamic Assignment - CORRECT ANSWER A process in which MAC addresses are assigned to a port when a host is connected" "Static Assignment - CORRECT ANSWER A process in which a MAC address has been manually assigned to a switch port" "Secure Address - CORRECT ANSWER An address with which a switch port automatically disables itself if a device with a different MAC address connects to the port" "Aging Time - CORRECT ANSWER The length of time a MAC address remains assigned to a port" "Isolating the Collision Domains - CORRECT ANSWER Breaking a network into segments, where a segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices" "Content Addressable Memory (CAM) - CORRECT ANSWER A table of MAC addresses and port mapping that a switch uses to identify connected networking devices" "Flooding - CORRECT ANSWER The term used to describe what happens when a switch doesn't have the destination MAC address stored in CAM and transmits a packet out all switch ports except for the port where the packet was received" "Broadcast Domain - CORRECT ANSWER An area in which any network broadcast sent over the network is seen by all networking devices" "Store-and-Forward - CORRECT ANSWER A mode in which an entire frame of data is received before any decision is made regarding forwarding the data packet to its destination" "Switch Latency - CORRECT ANSWER The length of time a data packet takes from the time it enters a switch until it exits" "Cut-Through - CORRECT ANSWER A mode in which a data packet is forwarded to the destination as soon as the destination MAC address has been read" "Adaptive cut-through - CORRECT ANSWER This mode is a combination of the store-and-forward and cut-through modes" "Error Threshold - CORRECT ANSWER The point at which the number of errors in the data packets has reached a threshold, and the switch changes from cut-through mode to store-and-forward mode" "Multilayer Switch (MLS) - CORRECT ANSWER A switch that operates at layer 2 but functions at the higher layers" "ASIC (Application Specific Integrated Circuit) - CORRECT ANSWER hardware that handles packet switching in layer 3 switches, which allows them to have very high forwarding rates" "Wire Speed Routing - CORRECT ANSWER A situation in which data packets are processed as quickly as they arrive" "network address - CORRECT ANSWER layer 3 address; logical address" "Logical Address - CORRECT ANSWER The IP address location of a network and the address location of a host in a network" "Router Interface - CORRECT ANSWER The physical connection where a router connects to a network" "Media Converter - CORRECT ANSWER A device used to adapt a layer 1 (physical layer) technology to another layer 1 technology" "Enterprise Network - CORRECT ANSWER The network used by a large company" "FastEthernet ports - CORRECT ANSWER FA0/0, FA0/1, FA0/2, ..." "Serial interface ports (S0/0, S0/1, S0/2, ...) - CORRECT ANSWER ports on a router, typically used to connect to communication carriers" "Routing Table - CORRECT ANSWER A table that keeps track of the routes to use for forwarding data to its destination" "Gateway - CORRECT ANSWER A networking device that enables hosts in a LAN to connect to networks (and hosts) outside the LAN" "NCP (network control protocol) - CORRECT ANSWER predecessor to today's Internet, used by ARPANET" "ARPANET - CORRECT ANSWER Advanced Research Projects Agency Network" "Well-known Ports - CORRECT ANSWER Ports 1-1023, reserved by ICANN" "registered ports - CORRECT ANSWER Ports , registered by ICANN" "Internet Corporation for Assigned Names and Numbers - CORRECT ANSWER ICANN" "Transport Layer Protocols - CORRECT ANSWER Protocols that define the type of connection established between hosts and how acknowledgements are sent" "TCP (Transport Control Protocol) - CORRECT ANSWER a connection-oriented protocol that establishes/terminates connections, verifies delivery of data packets, and includes support for error checking and recovering lost data" "Connection-Oriented Protocol - CORRECT ANSWER A type of protocol that establishes network connections, manages the delivery of data, and terminates connections" "SYN - CORRECT ANSWER Synchronizing packet" "SYN ACK - CORRECT ANSWER Synchronizing acknowledgement packet" "ACK - CORRECT ANSWER Acknowledgement packet" "UDP (User Datagram Protocol) - CORRECT ANSWER connectionless protocol that does not require a connection to send a packet and does not guarantee that the packet arrives at its destination" "Internet Layer - CORRECT ANSWER The layer of the TCP/IP model that defines the protocols used for addressing and routing data packets" "IP (Internet Protocol) - CORRECT ANSWER A protocol that defines the addressing used to identify the source and destination addresses of data packets being delivered over an IP network" "ICMP (Internet Control Message Protocol) - CORRECT ANSWER protocol that is used to control the flow of data in a network, perform errors, and perform diagnostics" "IGMP (Internet Group Message Protocol) - CORRECT ANSWER protocol that is used when one host needs to send data to many destination hosts" "Multicasting - CORRECT ANSWER A process in which one host sends data to many destination hosts" "Multicast Addresses - CORRECT ANSWER The addresses used to send multicast data packets" "Network Interface Layer - CORRECT ANSWER The layer of the TCP/IP model that defines how a host connects to a network" "IPv4 - CORRECT ANSWER 32-bit IP version currently being used on the Internet" "Class A (IPv4 Address range) - CORRECT ANSWER 0.0.0.0-127.255.255.255 8 network bits 24 host bits used for governments and very large networks" "Class B (IPv4 address range) - CORRECT ANSWER 128.0.0.0-191.255.255.255 16 network bits 16 host bits used for midsized companies and universities" "Class C (ipv4 address range) - CORRECT ANSWER 192.0.0.0-223.255.255.255 24 network bits 8 host bits originally planned with small networks in mind" "Class D (ipv4 address range) - CORRECT ANSWER 224.0.0.0-239.255.255.255 used for multiplexing" "Class E (ipv4 address range) - CORRECT ANSWER 240.0.0.0-254.255.255.255 experimental usage" "Non-Internet Routable IP Addresses - CORRECT ANSWER IP addresses that cannot be routed on the Internet" "RIRs (Regional Internet Registries) - CORRECT ANSWER IANA-designated governing organizations responsible for IP address allocation by geographic location" "ARIN - CORRECT ANSWER American Registry for Internet Numbers" "Subnet Mask - CORRECT ANSWER A number that identifies the network/subnet portion of an IP address" "subnetting - CORRECT ANSWER A technique used to break down (or partition) networks into subnets." "Classful - CORRECT ANSWER Indicates that IP and subnet addresses are within the same network" "Supernetting - CORRECT ANSWER A technique that allows multiple networks to be specified by one subnet mask" "CIDR (Classless Inter Domain Routing) - CORRECT ANSWER A notation in which the subnet mask is identified following the IP address" "Prefix Length Notation - CORRECT ANSWER A shorthand technique for writing the subnet mask in which class boundaries are not crossed" "CIDR Block - CORRECT ANSWER The grouping of two or more class networks together; also called supernetting" "Supernets - CORRECT ANSWER Groupings of two or more class networks together; also called CIDR blocks" "IPv6 - CORRECT ANSWER newer 128 bit IP address which allows for many more devices to be addressed." "IPng - CORRECT ANSWER IP Next Generation" "Full IPv6 Address - CORRECT ANSWER An address in which all 32 hexadecimal positions contain a value other than 0" "Unicast Address - CORRECT ANSWER An address that is used to identify a single network interface address, with data packets sent directly to the computer with the specified IPv6 address" "Multicast Address - CORRECT ANSWER An address that is used to send data packets to an entire group of networking devices, such as a group of routers running the same routing protocol" "Anycast Address - CORRECT ANSWER An address obtained from a list of addresses" "Link-Local Address - CORRECT ANSWER An address that is designed to be used for and is limited to communications on the local link" "6to4 Prefix - CORRECT ANSWER A technique that enables IPv6 hosts to communicate over the IPv4 Internet" "Stateless Address Autoconfiguration (SLAAC) - CORRECT ANSWER An IPv6 technique that allows server-less basic network configuration of IPv6 computers; allows an address's interface identifier to be automatically derived from an interface's MAC address" "VLAN (Virtual LAN) - CORRECT ANSWER A group of host computers and servers that are configured as if they are in the same LAN even if they reside across routers in separate LANs" "Port-Based VLAN - CORRECT ANSWER A VLAN in which host computers connected to specific ports on a switch are assigned to a specific VLAN" "Tag-Based VLAN - CORRECT ANSWER A VLAN in which the VLAN ID is based on 802.1Q; provides better security by logically isolating and grouping users" "VLAN ID - CORRECT ANSWER is used to identify that a frame belongs to a specific VLAN" "Protocol-Based VLAN - CORRECT ANSWER A VLAN in which connection to ports is based on the protocol being used & separates data traffic for the 2 networks" "Static VLAN - CORRECT ANSWER Basically, a port-based VLAN, in which assignments are created when ports are assigned to a specific VLAN" "Dynamic VLAN - CORRECT ANSWER A VLAN in which ports are assigned based on either the computer's MAC address or the username of the client logged on to the computer" "SNMP (SNMPv1; Simple Network Management Protocol) - CORRECT ANSWER a connectionless protocol that uses UDP for the transmission of data to and from UDP port 161; a fundamental network management tool that is widely supported in most modern network hardware" "Management Information Base (MIB) - CORRECT ANSWER A collection of standard objects that are used to obtain configuration parameters and performance data on a networking device" "SNMPv2 (Simple Network Management Protocol version 2) - CORRECT ANSWER version of SNMP that was not directly compatible with SNMPv1, had too many variants, and was not fully accepted by the industry" "SNMPv3 (Simple Network Management Protocol version 3) - CORRECT ANSWER version of SNMP that was directly compatible with SNMPv1 and offered the security features of confidentiality, integrity, and authentication" "jitter, latency, packet loss, queueing - CORRECT ANSWER issues handled/managed by QoS for VOIP" “Occupational Safety and Health Act - CORRECT ANSWER OSH Act" "Occupational Safety and Health Administration - CORRECT ANSWER OSHA" "National Fire Protection Association - CORRECT ANSWER NFPA; creates standards and codes to help form safe environments and prevent accidents" "Code of Federal Regulations - CORRECT ANSWER CFR" "Emergency action plan - CORRECT ANSWER EAP" "Fire prevention plan - CORRECT ANSWER FPP" "Safety data sheets - CORRECT ANSWER SDS; required documentation that identifies potential hazards; formerly MSDS (material SDS)" "PCI DSS (Payment Card Industry Data Security Standard) - CORRECT ANSWER standard set by the Payment Card Industry that holds banks and merchants accountable for any credit card breach" "MOU (memorandum of understanding) - CORRECT ANSWER a formal agreement between two or more parties to establish official service partnerships; sometimes called letter of intent (LOI)" "SLA (Service Level Agreement) - CORRECT ANSWER a formal agreement typically between a service provider and a client or end user that defines the level of service expected from the provider" "MSA (master service agreement) - CORRECT ANSWER an overarching document that creates a framework for multiple service level agreements; facilitates the creation of future agreements" "SOP (Standard Operating Procedure) - CORRECT ANSWER a procedure document that describes routine operations accompanied by step-by-step instructions showing how to perform routine activities; ensures quality and consistency of operations" "password policy - CORRECT ANSWER sets rules for computing passwords for an organization" "MTBF (Mean Time Between Failures) - CORRECT ANSWER measures the system's reliability by identifying the average time between failures" "MTTF (mean time to failure) - CORRECT ANSWER predicts the equipment runtime before a failure requires the equipment to be replaced" "MTTR (mean time to recover or repair) - CORRECT ANSWER measures the average time it takes to bring a system back from failure" "full backup - CORRECT ANSWER most complete type of backup, where all data is copied to a designed backup location or medium" "warm site - CORRECT ANSWER a not-yet-operational facility with power, cooling, and rack space; equipment is onsite but not racked or powered up" "asset management (inventory management) - CORRECT ANSWER protect assets and prevent misuse/loss of assets by establishing self-inventory that can be used in the audit process; from the procurement stage to assignment stage to disposal stage" "core - CORRECT ANSWER An independent processing unit that is responsible for reading and executing program instructions" "cache - CORRECT ANSWER A block of memory set aside for temporary storage of information" "Virtualization - CORRECT ANSWER A technology concept that involves creating a virtual computer" "virtual machine - CORRECT ANSWER VM, guest machine, guest VM" "Host Machine - CORRECT ANSWER Another name for a physical machine or virtual host" "vMotion, XenMotion, Live Migration - CORRECT ANSWER Different vendor options for moving a designated host server in the event of a physical server failure" "Hyper-V (a type 1 hypervisor) - CORRECT ANSWER A virtualization program that is part of Windows operating systems" "virtual switch - CORRECT ANSWER A software-based switch that is used for establishing connections between virtual and physical networks" "vSwitch (type 1 virtual switch; standard virtual switch) - CORRECT ANSWER typical virtual switch that is dedicated to one specific host and must be managed from that host" "dvSwitch (type 2 virtual switch; distributed virtual switch) - CORRECT ANSWER virtual switch that can span multiple host VMs, connecting their virtual networks together and needs to communicate with central control plane" "SaaS (Software as a Service) - CORRECT ANSWER A service that focuses on application delivery" "public cloud - CORRECT ANSWER cloud infrastructure operated by the cloud service company but made available for general public use" "private cloud - CORRECT ANSWER cloud infrastructure operated by the organization and made available only to members of the organization" "community cloud - CORRECT ANSWER cloud infrastructure that offers two or more organizations exclusive access to the infrastructure and computing resources" "hybrid cloud - CORRECT ANSWER cloud infrastructure that offers a combination of at least one private cloud and one public cloud" "SAN (storage area network) - CORRECT ANSWER a block-level data storage located across a network; a typical enterprise storage solution" "LUN (Logical Unit Number) - CORRECT ANSWER unique identifiers for a SAN; IP addresses of the file servers" "ARP Cache Poisoning - CORRECT ANSWER An attack in which an attacker changes the MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC address of the attacker so that conversations get redirected to the attacker" "Evil Twin - CORRECT ANSWER A situation in which a rogue wireless access point poses as a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless network" "Session Hijacking - CORRECT ANSWER Exploiting web session control by stealing a session cookie and using it to establish a session with a remote server that still thinks the session is valid" "Buffer Overflow - CORRECT ANSWER A situation that occurs when a program tries to put more data into a buffer than it was configured to hold" "Directed Broadcast - CORRECT ANSWER A broadcast that is sent to a specific subnet" "PDoS (permanent denial of service) - CORRECT ANSWER A malicious attack that aims to sabotage hardware and render it useless" "Spoof - CORRECT ANSWER To insert a different IP address in place of an IP packet's source address to make it appear that a packet came from another network" "Reflective/Amplified DoS Attack - CORRECT ANSWER An attack that uses spoofing to carry out the attack and is a combination of a reflection attack and an amplification attack" "Coordinated Attack - CORRECT ANSWER A type of distributed denial of service attack that is deliberate toward a specific target and orchestrated by a controller source like the command-and-control server in a botnet" "botnet - CORRECT ANSWER a group of infected/compromised computers on the Internet that are used to launch coordinated DoS attacks against another system on the network" "NAQC (Network Access Quarantine Control) - CORRECT ANSWER Windows server resource kit tool that allows admins to prevent remote clients from connecting to network" "Firewall - CORRECT ANSWER Hardware or software used to protect a computer network" "Access Control List (ACL) - CORRECT ANSWER A basic form of firewall protection involving a list of permissions attached to an object" "RADIUS (Remote Authentication Dial-In User Service) - CORRECT ANSWER most widely used AAA protocol" "UTM (Unified Threat Management) - CORRECT ANSWER an all-in-one solution that integrates a wide range of security features into one appliance" "site-to-site VPN - CORRECT ANSWER VPN that requires network hardware like a router or firewall to create and maintain the connection" "remote access VPN - CORRECT ANSWER VPN that facilitates network access for users that travel a lot and need access to the network" "client-to-site VPN - CORRECT ANSWER type of VPN that provides mobile users a way to remotely access their information from the home network" "PPTP (Point-to-Point Tunneling Protocol) - CORRECT ANSWER tunneling protocol that works in connection with a standard PPP -uses a modified GRE tunnel to carry its encapsulated packet for IP transmission -relies heavily on the underlying PPP authentication" "L2TP (Layer 2 Tunneling Protocol) - CORRECT ANSWER tunneling protocol that allows tunnel authentication and was created with the intention of merging 2 incompatible tunneling protocols (PPTP/L2F)" "L2F (Layer 2 Forwarding) - CORRECT ANSWER tunneling protocol that relies on the PPP authentication to be passed on to the corporate authentication server" "AH (Authentication Header) - CORRECT ANSWER -guarantees the authenticity of IP packets; -uses one-way hash algorithm such as MD5 or SHA-1 to ensure data integrity of IP packets" "ESP (Encapsulating Security Protocol) - CORRECT ANSWER uses symmetrical encryption algorithms to provide confidentiality to data messages (payloads)" "Shared key Authentication - CORRECT ANSWER Both the client and the access point share a key called a pre-shared key (PSK)." "WEP (Wired Equivalent Privacy) - CORRECT ANSWER wireless security protocol that encrypts and decrypts wireless data packets; uses RC4 algorithm for encryption but does not use a key management; initialization vector is only 24 bits in size and is always static" "WPA (Wi-Fi Protected Access) - CORRECT ANSWER improved wireless security protocol that supports user authentication provided by 802.1x; uses RC4 algorithm for encryption; provides a key management mechanism via TKIP and file integrity monitoring" "TKIP (Temporal Key Integrity Protocol) - CORRECT ANSWER security protocol that generates a sequence of WEP keys based on a master pre-shared key and rekeys periodically every 10,000 packets" "CSU/DSU (Channel service unit/data service unit) - CORRECT ANSWER equipment that provides hardware data interface to the carrier, including adding the framing information for maintaining the data flow, storing performance data, and providing line management." "HDLC (High-level Data Link Control) protocol - CORRECT ANSWER one of the protocols commonly used in WANs to carry data over a serial line connection" "PPP (point-to-point protocol) - CORRECT ANSWER subset of the HDLC data encapsulation; full-duplex protocol used for serial interface connections such as that provided by modems; de facto protocol of dial-up networking that later led to various authentication technologies; commonly uses PAP and CHAP for authentication" "DHCP (Dynamic Host Configuration Protocol) - CORRECT ANSWER A network service that provides automatic assignment of IP addresses" "Lease Time - CORRECT ANSWER The amount of time that a client can hold an IP address" "APIPA (Automatic Private IP Addressing) - CORRECT ANSWER Feature of Windows that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically." "Root Servers - CORRECT ANSWER A group of servers that exist using well-known IP addresses that have been programmed into DNS servers" "Domain Registrar - CORRECT ANSWER An organization that is authorized to register Internet domain names" "PTR Record (Pointer Record) - CORRECT ANSWER The reverse of an A record; a mapping of an IP address to a hostname" "NS Record (Name Server Record) - CORRECT ANSWER A record that specifies the name of the authoritative name server of the domain" "MX Record (Mail Exchange Record) - CORRECT ANSWER A record that specifies the email-handling server of the domain" "application layer - CORRECT ANSWER layer 7 of the OSI model, which interacts with application programs that incorporate a communication component such as your internet browser and email" "star topology - CORRECT ANSWER the most common networking topology in today's LANs, where all networking devices connect to a central switch or hub; includes twisted-pair cables with modular plugs which are used to connect the computers and other networking devices" "bus topology - CORRECT ANSWER a system in which the computers share the media; includes coaxial cable which is looped through each networking device to facilitate data transfer" "switch - CORRECT ANSWER establishes a direct connection from the sender to the destination; a device that forwards a frame it receives directly out of the port associated with its destination address" "ports - CORRECT ANSWER the physical input/output interfaces to networking hardware" "OSI Model (Open

Show more Read less
Institution
Networking
Module
Networking











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Networking
Module
Networking

Document information

Uploaded on
April 3, 2025
Number of pages
36
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C172 WGU COMPLETE V3 STUDY GUIDE
AN A+ STUDY SOLUTION 2023.
"Biometric Systems - CORRECT ANSWER Systems that measure and analyze specific
characteristics of the human body for the purpose of authentication"

"FERPA (Family Educational Rights and Privacy Act) - CORRECT ANSWER federal law that
requires all educational institutions to protect the privacy of student education records"

"FISMA (Federal Information Security Management Act) - CORRECT ANSWER a federal law
that was developed to protect government information, operations, and assets against security
threats"

"GLBA (Gramm-Leach-Bliley Act) - CORRECT ANSWER federal law that requires all financial
institutions to protect customer financial information data, to safeguard the financial
information against security threats, and to deny any unwarranted access to financial data"

"HIPAA (Health Insurance Portability and Accountability Act) - CORRECT ANSWER federal
law that requires all health-related agencies to protect the personally identifiable information
(PII) of patients"



"MLA (Master license agreement) - CORRECT ANSWER defines the owner rights, terms, and
conditions related to intellectual property"

"NDA (Non-Disclosure Agreement) - CORRECT ANSWER a legal agreement to bind a party or
parties to not disclose or share specific information"

"SOW (Statement of work) - CORRECT ANSWER a document often used in conjunction with
an MSA that contains all the specifics of the service;
includes deliverables, schedules, responsibilities"

"AUP (Acceptable Use Policy) - CORRECT ANSWER outlines the acceptable use of IT
equipment and related services"

"incident response policy - CORRECT ANSWER 1. preparation
2. identification


2

, 3. containment
4. eradication
5. recovery
6. follow-up"

"privileged user agreement - CORRECT ANSWER establishes expectations for the conduct of
individuals granted privileged access to an organization's enterprise systems and services"



"differential backup - CORRECT ANSWER includes all data that has changed since the last full
backup"

"incremental backup - CORRECT ANSWER only include data that has changed since the
previous backup copy;
takes the least time and the least storage space"

"HA (High Availability) - CORRECT ANSWER describes systems that are in continuous
operation for a long time, with minimal downtime"

"cold site - CORRECT ANSWER empty facility with only power and cooling, but no
equipment or racks"

"hot site - CORRECT ANSWER full-blown operational facility with power, cooling, and
equipment racked and powered up and connected to the network; a duplicate of the current
data center"



"Hypervisor - CORRECT ANSWER Software that is used for managing and controlling the
underlying physical hardware and associated virtual hardware"

"Virtual machine monitor - CORRECT ANSWER VMM"

"Type 1 Hypervisor (bare-metal hypervisor) - CORRECT ANSWER A hypervisor that is loaded
directly on hardware to abstract the hardware to the virtualization layer and that is commonly
used on servers"

"Type 2 Hypervisor (hosted hypervisor) - CORRECT ANSWER A hypervisor that is loaded on
an operating system and abstracts the virtualization layer through its host operating system and
is commonly used on personal computers"


2

, "Cloud - CORRECT ANSWER Another name for Internet-based services"

"Outsourcing - CORRECT ANSWER Obtaining goods or services from an outside source
rather than an internal source"

"cloud computing (cloud service) - CORRECT ANSWER An outsourced and hosted computing
environment that delivers IT services to users via a network"

"MX (mail exchange) record - CORRECT ANSWER The mail exchange record, which points to
the incoming email servers of the organization"

"CNAME record (canonical name record) - CORRECT ANSWER used to specify that a domain
name is an alias for another domain (alias for a hostname)"

"IaaS (Infrastructure as a Service) - CORRECT ANSWER A service that focuses on the facilities
and infrastructure in the data center and the virtualization and abstraction layer that exists on
top of the physical facilities and infrastructure"

"PaaS (Platform as a Service) - CORRECT ANSWER A service that focuses on application
development on any desired platform utilizing cloud computing"



"Fibre Channel (FC) - CORRECT ANSWER The original high-speed technology used to connect
data storage to servers;
uses fiber-optic cables to connect storage devices into a network"

"IB (Infiniband) - CORRECT ANSWER A technology that provides high performance and high
throughput with low latency;
fastest storage interface, with speed of 200Gbps"

"FCoE (Fibre Channel over Ethernet) - CORRECT ANSWER A technology that
encapsulates Fibre Channel frames over Ethernet networks allowing FC to use 10Gbps (or
higher) Ethernet networks
while preserving the
FC protocol; jumbo frame supported"




2

, "iSCSI (Internet Small Computer Systems Interface) - CORRECT ANSWER technology that
enables the SCSI protocol to communicate over IP networks"

"NAS (Network Attached Storage) - CORRECT ANSWER a file-level storage device that can be
accessed on a network;
available on FTP, NFS, AFP, SMB"

"Social Engineering - CORRECT ANSWER A process by which an intruder obtains enough
information from people to gain access to the network"

"Password Cracking - CORRECT ANSWER An attack in which the attacker tries to guess the
user's password"

"Dictionary Attack - CORRECT ANSWER An attack that uses known passwords and many
variations (upper- and lowercase and combinations) to try to log in to an account"

"Brute-Force Attack - CORRECT ANSWER An attack in which the attacker uses every possible
combination of characters to guess the password"

"Packet Sniffing - CORRECT ANSWER A technique in which the contents of data packets are
watched"

"IPSec (Internet Protocol Security) - CORRECT ANSWER layer 3 protocol in which each
packet is encrypted prior to transmission across the network link"

"Man-in-the-Middle - CORRECT ANSWER An attack in which an attacker can seamlessly
place itself in the middle of a conversation between others in order to become the recipient of
all information sent by victim computers"



"netstat -a - CORRECT ANSWER The command used to display the ports currently open on a
Windows operating system"

"netstat -b - CORRECT ANSWER The command used to display the executable involved in
creating the connection or listening port"

"nmap - CORRECT ANSWER A Linux and Windows port scanner"




2
£13.84
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Andreas4114 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
28
Member since
10 months
Number of followers
1
Documents
809
Last sold
1 week ago

4.7

3 reviews

5
2
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions