Switching and Routing Terminology

Edit Answers
ZABSKBBXTDWZURPMLCZTVG4VI6CMS AUTO-MDIXJULRLK64ZWPLHXPPBNDA 4HMRQX-6ZIY6KUQBGATHAWKTA6OKR ERVJSUBNETMASKRXZOIONYLNDPILP CLASSLESSROUTINGPROTOCOLDOTHS VEQLQTATOFEOSXJ6ZIIIPV6GRRCOP IQD4KPJQ-JMXFUIBVOIPPHONETEWO 6UPRQTPWDHCPSNOOPINGST-ISAPRO DJJ-EQ-UMACADDRESSGNSILTSUSCF OC6NR4IAMGGLSHRWQTD6ECZUMTNBI UVY6XYTAHUQDCKPFZGILRTVOBHIPN B-BTFEDI6AJTFMOLICYID-6RKEPDG L6ESAGPLNSIAAHWFVBV4DGQRRNRUV ETOWYIKCTWYCMTEYTQGUAWJOOTALL TCSFCF6ISPFA4RRRBXERYHBTWICIA AELTZZCMCICBBOOOZ4GNAKUCTCINN GI64FKTLLFNAHPVYDNWTWC6EEAMKH GOOUYXITLOSKKSEVHZ-FEGTVNTASO IMEMOFEOVETNLSRXJPQNTXOEAINTP NAAKPROBBEUYHEEQNQFOAUTCEOYAP GC6KIDJQURSW-CTNAFEPGIGNRNDTI -SRNI6ILTXNKUCHVVKHPGBDAASCEN SPGNCPTTMEDLIAEKQHLK-4RTLPARG VOGEVQJVMDQPPORTTAGGINGSAXMOU ZOX4HWYHPFBEUSN4QPOQXBRICOTUP FFPGIJUMBOFRAMES4VNTJIMDOAATW RIQAIUOFROQPGMTAVSJ-GYRQLMBI6 NNDYNAMICTRUNKINGPROTOCOLYLNJ AGCLASSFULROUTINGPROTOCOLJEGD
1.
A communication device that connects other network devices and receives and forwards data to a specified destination within a LAN.
2.
A unique identifier given to every device that connects to a network and is comprised of a 48-bit number separated into six 2-byte numbers.
3.
A set of computers and devices connected in one physical location.
4.
A logical grouping of computers through segmentation in a LAN.
5.
A port configuration that allows multiple VLANs to connect through a single port and is also known as a tagged port.
6.
A port that allows traffic from only one VLAN.
7.
A line sensing port configured to automatically detect the needed cable connection type and then configure the connection accordingly.
8.
To avoid switching loops, switches use BPDU frames to determine the network topology. BPDU frames contain such things as the switch ID, its MAC address and switch port cost. BPDU is an important function used by Spanning Tree Protocol (STP), which is used
9.
The process of providing electrical power to a device by means of a copper Ethernet cable.
10.
A telephone with hardware or software that allows phone calls to be made over an IP network.
11.
A technique of adding a VLAN ID into an Ethernet frame. The tag identifies which VLAN the frame is coming from or going to. A tagged frame is called an 802.1q frame or a Dot1q frame.
12.
A switch port security feature that adds the MAC addresses of known devices to the Content Addressable Memory (CAM) table, or MAC address table. These MAC addresses can be dynamically learned or entered manually. Unless saved to the startup configuration,
13.
Ethernet frames that exceed the IEEE 802.3 limit of a 1,500 byte payload and can carry a payload of up to 9,000 bytes.
14.
A switch feature that restricts connection to a given port based on the MAC address.
15.
A switch feature that follows the 802.1x protocol to allow only authenticated devices to connect.
16.
A table maintained by a switch that contains MAC addresses and their corresponding port locations.
17.
A security feature on some switches that filters out untrusted DHCP messages.
18.
A security feature on some switches that verifies that each ARP request has a valid IP-to-MAC binding.
19.
An attack that overloads a switch's MAC forwarding table to make the switch function like a hub.
20.
An attack in which the attacker's MAC address is associated with the IP address of a target's device.
21.
An attack in which the source MAC address is changed on frames sent by the attacker.
22.
An attack in which the attacking host adds two VLAN tags instead of one to the header of the frames that it transmits.
23.
An attack in which the source MAC address is changed in the header of a frame.
24.
An unsecure protocol that could allow unauthorized devices to modify a switch's configuration.
25.
A routing protocol that does not have subnet mask information in the routing updates.
26.
A routing protocol that does include subnet mask information in the routing updates.
27.
A routing technique in which every router sends a complete topography of the routers in the network out to directly connected routers.
28.
A routing technique in which every router sends information about directly connected links to all the routers in the network.
29.
A numerical identifier assigned to each device on the internet or local network. It is used for communication between devices.
30.
A 32-bit numerical addressing method. It contains It has 12 header fields and checksum fields, supports broadcast and variable length subnet masking, and uses ARP.
31.
A 128-bit alphanumeric addressing method that contains eight header fields and uses NDP, but does not contain checksum fields or support broadcast or variable length subnet mask.
32.
A 32-bit dot decimal notation that distinguishes which part of the IP address refers to the host and which part refers to the subnet. It also limits the IP addresses and the number of hosts that can exist within the subnet.
33.
A router that connects a local network to other networks and is also called the default gateway.
34.
A naming system that converts human readable domain names into IP addresses.