Wgu Comptia Network+ Chapter 3 Flashcards
coaxial cable
A cable that is composed of two conductors. One of the conductors is an inner insulated conductor. This inner conductor is surrounded by another conductor. This second conductor is sometimes made of a metallic foil or woven wire.
twisted-pair cable
Today's most popular media type is a ____ cable, where individually insulated copper strands are intertwined into a twisted-pair cable. Two categories of ___ cable include shielded ___ (STP) and unshielded ____ (UTP).
shielded twisted-pair (STP) cable
___ cabling prevents wires in a cable from acting as an antenna, which might receive or transmit EMI. ___ cable might have a metallic shielding, similar to the braided wire that acts as an outer conductor in a coaxial cable.
unshielded twisted-pair (UTP) cable
Blocks EMI from the copper strands making up a twisted-pair cable by having more tightly twisted strands (that is, more twists per centimeter). Because these strands are wrapped around each other, the wires insulate each other from EMI.
electromagnetic interference (EMI)
An electromagnetic waveform that can be received by network cable (possibly corrupting data traveling on the cable) or radiated from a network cable (possibly interfering with data traveling on another cable).
plenum
____ cabling is fire retardant and minimizes toxic fumes released by network cabling if that cable were to catch on fire. As a result, ____ cabling is often a requirement of local fire codes for cable in raised flooring or in other open-air return ducts.
multimode fiber (MMF)
____ optic cabling has a core with a diameter large enough to permit the injection of light at multiple angles. The different paths (that is, modes) that light travels can lead to ____ delay distortion, which causes bits to be received out of order because the pulses of light representing the bits traveled different paths (and therefore different distances).
single-mode fiber (SMF)
____ cabling has a core with a diameter large enough to permit only a single path for light pulses (that is, only one mode of propagation). By having a single path for light to travel, ___ eliminates the concern of multimode delay distortion.
66 block
Traditionally used in corporate environments for cross-connecting phone system cabling. As 10Mbps LANs started to grow in popularity in the late 1980s and early 1990s, these termination blocks were used to cross-connect Category 3 UTP cabling. The electrical characteristics (specifically, crosstalk) of a __ ____, however, do not support higher-speed LAN technologies, such as 100Mbps Ethernet networks.
110 block
Because 66 blocks are subject to too much crosstalk for higher-speed LAN connections, ___ blocks can be used to terminate a cable (such as a Category 5 cable) being used for those higher-speed LANs.
multilayer switch
Like a router, a ___ switch can make traffic forwarding decisions based on Layer 3 information. Although ____ switches more closely approach wire-speed throughput than most routers, routers tend to have a greater feature set and are capable of supporting more interface types than a _____ switch.
firewall
Primarily a network security appliance, a ____ can protect a trusted network (for example, a corporate LAN) from an untrusted network (for example, the Internet) by allowing the trusted network to send traffic into the untrusted network and receive the return traffic from the untrusted network, while blocking traffic for sessions that were initiated on the untrusted network.
Domain Name System (DNS) server
Performs the task of taking a domain name (for example, www.ciscopress.com) and resolving that name into a corresponding IP address (for example, 10.1.2.3).
Dynamic Host Configuration Protocol (DHCP)
Dynamically assigns IP address information (for example, IP address, subnet mask, DNS server's IP address, and default gateway's IP address) to network devices.
proxy server
Intercepts requests being sent from a client and forwards those requests on to their intended destination. The ____ server then sends any return traffic to the client that initiated the session. This provides address hiding for the client. Also, some ____ servers conserve WAN bandwidth by offering a content-caching function. In addition, some proxy servers offer URL filtering to, for example, block users from accessing social networking sites during working hours.
content engine
A dedicated appliance whose role is to locally cache content received from a remote network (for example, a destination on the Internet). Subsequent requests for that content can be serviced locally, from the _____, thus reducing bandwidth demand on a WAN.
content switch
Can be used to load-balance requests for content across a group of servers containing that content. If one of the servers in the group needs to have maintenance performed, that server could be administratively removed from the group, as defined on the _____ switch. As a result, the ____ switch can help maximize uptime when performing server maintenance. It minimizes the load on individual servers by distributing its load across multiple identical servers.
virtual server
Allows a single physical server to host multiple virtual instances of various operating systems. This allows, for example, a single physical server to simultaneously host multiple Microsoft Windows servers and multiple Linux servers.
virtual switch
Performs Layer 2 functions (for example, VLAN separation and filtering) between various server instances running on a single physical server.
virtual desktop
A ___ ___ solution allows a user to store data in a centralized data center, as opposed to the hard drive of his local computer. Then, with appropriate authentication credentials, that user can access his data from various remote devices (for example, his smartphone or another computer).
onsite
The term ____ in the context of virtualization technologies refers to hosting virtual devices on hardware physically located in a corporate data center.
offsite
The term ____ in the context of virtualization technologies refers to hosting virtual devices on hardware physically located in a service provider's data center.
network as a service (NaaS)
A service provider offering where clients can purchase data services (for example, email, LDAP, and DNS services) traditionally hosted in a corporate data center.
virtual PBX
Usually a VoIP telephony solution hosted by a service provider, which interconnects with a company's existing telephone system.
Session Initiation Protocol (SIP)
A VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls.
Real-time Transport Protocol (RTP)
A Layer 4 protocol that carries voice (and interactive video).
software as a service (SaaS)
Providing applications or application services via the cloud.
platform as a service (PaaS)
This category of cloud permits the delivery of operating systems and libraries needed by developers.
infrastructure as a service (IaaS)
Providing network infrastructure as a service using cloud technologies.
IP Address Management
The software and processes for managing the IP addresses used in an organization.
software-defined networking (SDN)
An approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and provide abstraction of lower-level functionality.
software-defined networking (SDN) controller
Often referred to as the "brains" of the ___ network, this device sends commands to the network devices to have configurations made.
Z-Wave
A wireless communications protocol used primarily for home automation. It is a mesh network using low-energy radio waves to communicate from appliance to appliance, allowing for wireless control of residential appliances and other devices, such as lighting control, security systems, thermostats, windows, locks, swimming pools, and garage door openers.
ANT+
A wireless protocol for monitoring sensor data such as a person's heart rate or a car's tire pressure, as well as for controlling systems such as indoor lighting and television sets. ___ is designed and maintained by the ___ Alliance, which is owned by Garmin. It is based on the ___ protocol.
Bluetooth
A wireless protocol for creating a personal area network, where a device such as a mobile phone can send data to a headset, for example.
Near Field Communication (NFC)
A wireless communications technology that might be seen in the Internet of Things. This technology is often used in payment systems.
infrared (IR)
A wireless line-of-sight technology that might be found in an Internet of Things deployment.
radio-frequency identification (RFID)
___ uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.
wireless range extender
Since all 802.11 wireless technologies have distance limitations, a ___ ___ ___ can amplify the signal and extend the reachability of a wireless cell.
next-generation firewall (NGFW)
More modern firewalls that can perform tasks such as deep packet inspection.
Fibre Channel over Ethernet (FCoE)
Technology that permits SAN traffic of FC over the Ethernet media.
Network Access Server (NAS)
A network device specialized in controlling access to the network. ___ might also stand for network-attached storage.
storage area network (SAN)
A specialized network for the storage of data.
A
An address record (that is, ___ record) maps a hostname to an IPv4 address.
AAAA
An IPv6 address record (that is, ____ record) maps a hostname to an IPv6 address.
CNAME
A canonical name record (that is, ____ record) is an alias of an existing record, thus allowing multiple DNS records to map to the same IP address.
MX
A mail exchange record (that is, __ record) maps a domain name to an email (or message transfer agent) server for that domain.
NS
Delegates a DNS zone to use the given authoritative name servers.
PTR
A pointer record (that is, ___ record) points to a canonical name. A ___ record is commonly used when performing a reverse DNS lookup, which is a process used to determine what domain name is associated with a known IP address.
SOA
A start of authority record (that is, ___ record) provides authoritative information about a DNS zone, such as email contact information for the zone's administrator, the zone's primary name server, and various refresh timers.
SRV
A generalized service location record. Used for newer protocols instead of creating protocol-specific records such as MX.
TXT
Originally for arbitrary human-readable text in a DNS record. Since the early 1990s, however, this record carries machine-readable data, such as specified by RFC 1464, opportunistic encryption, Sender Policy Framework (SPF), or DomainKeys Identified Email (DKIM).