• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
What is X.25?
The first commercially successful connection oriented packet switching network where packets travel over virtual circuits.
What is Link Access Procedure Balanced?
For use in X.25 networks defines frame types and is capable of retransmitting, exchanging, and acknowledging frames as well as detecting out of sequence or missing frames
What is Frame Relay?
A high-performance WAN protocol that was originally developed for ISDN and is considered the successor to X.25/LAPB
At what layer of the OSI model does Frame Relay operate?
Data link
What is the maximum effective radius of a Switched Multimegabit Data Service network?
30 Miles
What is a Switched Multimegabit Data Service network use for?
to extend LAN like performance to a MAN or WAN
Describe an ATM network
High-bandwidth, low delay technology that uses both switching and multiplexing. It uses 53-byte fixed size cells instead of frames
What is a multiplexer?
It enables several signals to be sent over one physical
What are the private IP address ranges?
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
What are the two primary types of ISDN interfaces?
Basic Rate Interface and Primary Rate Interface
How many channels (up/down) comprise a Basic Rate Interface?
Two B & one D
How many channels (up/down) comprise a Primary Rate Interface?
1 Single D channel + 23/30 channels for voice and data
What layer does the Point to Point Protocol operate at?
Data Link
What is the main difference between Layer 2 and Layer 3 tunneling protocols
Layer 2 protocols use frames and Layer 3 protocols use headers
IPSEC can support multiple ______ but not multiple _________
simultaneous tunnels; multiple protocols
To create an IPSEC tunnel that provides source authentication and integrity without encryption which protocol would I enable?
AH
To create an IPSEC tunnel that provides authentication, integrity and encryption what protocol would I use?
ESP
What is the early de facto standard for dial up communications
SLIP
What succeeded SLIP?
PPP
What type of authentication does PPP use?
PAP, CHAP and MS-CHAP
How does CHAP protect against replay attacks?
It does not send the password in clear text an it uses an arbitrary challenge string for each authentication attempt
How does CHAP prevent against remote client impersonation?
By sending challenge strings at random intervals.
What RFC defines CHAP/PAP
RFC1334
What is one advantage of MS-CHAP V2 over regular MS-CHAP/CHAP?
Mutual authentication support
What extention to EAP allows for authentication using digital certificates?
EAP-TLS
It can be said that TACAS and RADIUS are "standards based"...what does that mean?
That they can interoperate with other systems of the same time.
Is RADIUS TCP or UDP?
UDP
Why is RADIUS not used for router-to-router authentication?
It does not provide support for two-way authentication
What does TACAS+ provide that TACAS does not provide?
two factor password authentication
the ability for a user to change thier password
the capability for resynchronizing security tokens
better audit trails
RAID 0
Striping
RAID 1
Mirroring
RAID 2
Hamming Code Parity (bit-interleaved parity)
RAID 3
Byte Level Parity
RAID 4
Block Level Parity
RAID 5
Interleave Parity
What is te most common implementation of RAID
RAID 5
What is the difference between remote journaling and electronic journaling?
Electronic vaulting happens at pretimed intervals whereas remote journaling is real time
802.11a
54 Mbps in the 5GHZ range
802.11b
11 Mbps
802.11g
54 Mbps in 2.4 GHZ band
802.15
PANs
What is 802.1X
Port based authentication for security in wireless networks
What is LEAP
it dynamically creates WEP keys making WEP more secure.
What are the two different spread spectrum technologies in use in 2.4GHZ LANs
Direct-dequence spread spectrum(DSSS) and frequency hopping spread spectrum (FHSS)
How many non-overlapping channels are used in DSSS?
Typically 3
What are the FCC regulations for FHSS networks?
75 or more frequencies can be used with a maximum dwell time of 400ms
What are the five layers of WAP?
application, session, transaction, security and transport
What does the application layer of WAP consist of?
The wireless application environment (WAE), a microbrowser specification for internet access, wireless markup language, WMLScript
What does the Transport layer of the WAP consist of?
Wireless Datagram Protocol
What are the three classes of WTLS security?
Class 1: anonymous authentication
Class 2: Server Authentication
Class 3: Two-way client and server authentication