Chapter 14 Terminology

Edit Answers
NPXQZTQXXPWIFIANALYZERVPDRJ LAEPPYTILIBALIAVAHGIHDEQSQU IFCONFIGLNDQUALITYOFSERVICE SXSJQXRMAGGIFNOCPITCPDUMPUS AWYFHTRECARTEKGRCMESGFTKGKI XSPANNINGTREEPSEORVPAEAZNVL UHVCFSTATSTENDAPWOHAWTEWIOZ GOGJACHSUKZDEZRAMHQSPMFSTPT HSXXMRRWVLCEYROHKDWJQHDROTO CTICDEPIFOFPXKUSXGMDPAEQOIL TNNAHEBTWLFPYMDCOQBIDESDHCT IACCCNECVRQUOTNIZVFHGSNISAH WMOHPELHEOTSERJFVBCAFGEFELA SERIEDODUGJNQLTFYPAHTUCFLLR RBRNXSAEOFLRXLWAXTZFXHISBID EAEGHUDPZEVRAHNRGUJKSHLEUNW YBCEABBETGDQTLCTJGJSFVGROKA AETNUNANOFAULTTOLERANCEVRBR LMVGSELDSWITCHINDEPENDENTUE IILITTAEJEDCLZIDAMOCGPMBDDF TTANIYNNGZQYXOTXRCAGTAVCBGA LPNEOOCTFPKQUUSPEEDTESTSNEI UUETNJIQEHHGNIMAETCINJQIXTL MFLVNRNMKROGUEDHCPFREPIDOCU QSDJXDGNSLOOKUPANDDIGFXQLNR CETACIFITRECLSSDETSURTNUZBE SLOCOTORPNOITULOSERSSERDDAB
1.
This (also called Ethernet bonding) logically groups two or more physical connections to the same network. Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network.
2.
A protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol (STP) runs on each switch and is used to select a single path between any two switches.
3.
A process that configures a group of servers in a logical group called a server farm. Incoming requests to the group are distributed to individual members within the group. Incoming requests can be distributed evenly or unevenly between group members base
4.
The mechanism used to save previously acquired data for quick retrieval at a later time. Caching stores data in memory or on disk within a network device, where it can quickly be retrieved when needed.
5.
A set of mechanisms that try to guarantee timely delivery or minimal delay of important or time-sensitive communications.
6.
A device that can modify the flow of data through a network in response to network traffic conditions.
7.
This is also called a content switch, that operates at OSI model layers above Layer 2 and can use other information within a packet to make forwarding decisions.
8.
A subnetwork placed between the LAN and untrusted networks, such as the internet. External network nodes can access only what you choose to expose in the screened subnet. The rest of the network is protected by firewalls. A screened subnet was previously
9.
A Cisco protocol that lets you combine Ethernet ports to improve the speed of aggregated, or related, file transfers. This protocol is also called link aggregation, teaming ports, and port trunking.
10.
A Layer 3 protocol QoS uses to classify IP packets. Each IP packet header has a DiffServ field. DiffServ inserts a differentiated services code point (DSCP) value in this field to prioritize data flow. Routers forward packets according to the value in thi
11.
A fault tolerance implementation that allows multiple firewalls and/or routers on the same local network to share a set of IP addresses. If one of the firewalls or routers fails, the shared IP address allows hosts to continue communicating with the firewa
12.
A type of teaming that requires that the adapters in a team are connected to the same switch.
13.
A type of teaming that allows the adapters in a team to connect to different switches.
14.
A malfunction within the electronic circuits or electromechanical components (disks or tapes) of a computer system.
15.
A Dynamic Host Configuration Protocol (DHCP) server that is not controlled by the network administration or staff.
16.
A situation in which there are more host requests for IP addresses and related configuration information than the DHCP server can provide.
17.
servers that use IPv4 have a finite set of addresses specific to a single network. The pool of addresses can become exhausted, and the server can no longer provide every machine with an IP address and configuration information.
18.
Certificates that are misconfigured or not stored in a certificate authority list. Untrusted SSL certificates can block connectivity to certain sites. These certificates can be stored on a browser controlled by a server.
19.
Features that require licenses to be purchased in order to provide the programs and services. If licenses are not set up correctly, the features will not be available for use on the network.
20.
A VLAN port not configured correctly. This can result in security and connectivity issues on a network.
21.
An equation that reports communication signal gains and losses on a network. A low optical link budget indicates signal losses on the network that may affect efficiency.
22.
A command that is part of the ICMP protocol. It sends a request in the form of a packet to another network device. The packet requests a reply in return, which is also in packet form.
23.
A command that measures the distance between two devices by the number of other devices it has to pass through in order to get to its destination.
24.
Tools that can look up information such as an IP address from a domain server.
25.
(Windows)A command that gives the user the state of the media device on a network and how it is configured.
26.
(Linux) A command that gives the user the state of the media device on a network and how it is configured.
27.
A command that displays network connections for Transmission Control Protocol (TCP).
28.
A unique name for a computer on a network. A computer is discovered on the network using the hostname.
29.
A communication protocol used for discovering the MAC address associated with an IP address.
30.
A network protocol that allows a remote console to access other devices within a network.
31.
A network protocol similar to Telnet except that it uses encryption to hide certain information, such as user credentials, on the other end of the transmission.
32.
This is a packet analyzer that runs as a command line utility. It allows the user to view TCP/IP and other packets as they are transmitted and received over on a computer's network.
33.
These tools are available online, such as speedtest.net. It measures download and upload speeds between networks.
34.
A cross platform tool that measures speeds across a network over multiple connections.
35.
This tool can detect all the channels that are broadcasting in the area and see all the overlaps in your Wireless network.
36.
This refers to redundancy to provide access in the event of component failure.
37.
This is the ability of a network or a service to be up and accessible most of the time.
38.
This is the percent of time the network or service is up and accessible.
39.
When issues arise on systems or networks we use this step by step methodology to lead us to the source of the problem, it may reduce the time is takes to repair the issues within the network.