Term for a block-level storage network?
What is a SAN
A logical grouping of computers based on switch port.
What is a Virtual LAN
(VLAN)?
A type of malware that is a self-replicating program.
What is a Worm?
The first 64 bits of the IPv6 address.
What is a Prefix ID?
A weak area of a network that could result in a security breach.
What is a Vulnerability?
A term representing a type routing protocol that does include subnet mask information in the routing updates.
What is Classless Routing Protocol?
Term for an address that identifies the network and host address assigned to a device
What is an IP address?
A local text file on each computer that maps hostnames to IP addresses.
What is a HOSTS file?
A device that allows for Wi-Fi connectivity on a wired network.
What is an Access Point (AP)
Term for a portion of a network with a common network address.
What is a subnet?
A form of Distributed DoS attack that spoofs the source address in ICMP packets.
What is a Smurf Attack?
A term for a topology that uses a hub or switch to connect all network connections to a single physical location
What is a star topology?
Within the context of Ethernet, A unit of data that is ready to be sent on the network medium.
What is a Frame?
Term used to describe how devices are connected and how data flows from device to device
What is Topology?
A server used to centralize authentication, authorization, and accounting for multiple remote access servers.
What is a AAA Server?
A term that describes the structure of an IP address that defines the network ID and host ID.
What is a Subnet mask?
A network device where data packets that are leaving the network should go to be routed.
What is a Default Gateway?
A term for a device that connects two or more network segments or subnets
What is a Router?
The devices physically located on the subscriber's premises.
What is Customer premises equipment (CPE)?
Term used to describe rules or standards about how hosts communicate
What are protocols?
A set of protocols that provides security for Internet Protocol (IP) which can be used to set up a VPN solution.
What is Internet Protocol Security (IPsec)?
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
An unsecure protocol that could allow unauthorized devices to modify a switch's configuration.
What is Dynamic Trunking Protocol (DTP)?
Part of SMNP, A database of host configuration information.
What is Management information base
(MIB)?
A false positive (or Type II error) occurs when a person who should be denied access is allowed access.
What is a False positive?