Networking Tools and Methodologies
Ethernet
Network Topologies and Protocols
Networking Hardware
Random Questions
100

Useful for Troubleshooting a Network, Programs that do this are known as Packet Sniffers

What is Port Monitoring

100

These are the two standard types of ethernet cables

What are UTP and STP?

100

A type of topology in which a token was passed from computer to computer on the network. If you had the token, you could transmit

What is a Token Ring (not a Tolkien Ring)?

100

It sends a received signal out on all ports except the port that it was received on.

What is a hub?

100

The term for a large flock of crows

What is a Murder of Crows?

200

A server which provides user authentication and works with the credentials database to allow users access to a network through a switch or other initial connection point

What is a RADIUS server?

200

A Technology that uses light instead of electrical voltage to transmit data

What is Fiber Optic Technology?

200

An error caused when two computers on a network attempt to send packets simultaneously

What is a Collision?
200

A networking device in which each device on the network is connected to its own port and as such, it's own collision domain

What is a switch?

200

The spice made from the outer webbing of a nutmeg nut

What is Mace?

300

A redundancy method that ensures that, should a primary router or gateway fail, another is available to maintain network connection

What is first hop redundancy

300

These are the two main types of fiber optic cable

What are Multi-Mode and Single Mode Cables? 

300

A Protocol used by almost all modern switches to avoid redundant links causing a broadcast storm

What is Spanning Tree Protocol?

300

this feature can set priority flags on packets coming through a switch to ensure high priority packets are directed first

What is QoS (Quality of Service)

300

He developed the incandescent light bulb

Who is Thomas Edison?

400

A type of encryption in which the client and the server they are connecting to each have a half a key for encryption an decryption. Only by sharing a one of their keys can the data be encrypted or decrypted.

What is Public Key encryption?

400
A type of cable that is used to run network through the empty space in a buildings ceiling

What is Plenum cable?

400

Makes multiple redundant links into one logical link to take care of congestion issues on a network

What is LACP (Link Aggregation Control Protocol)?

400

A device which performs Network Address Translation and is the common gateway for traffic into or out of a network

What is a Router? 

400

A rocket's nozzle produces thrust through this well known physics concept which states that "As a constrained fluid's velocity increases through a choke point, it's pressure decreases"

What is the Venturi Effect?

500

Using SSH to configure a manageable switch, and connectiong off of your normal network. This is referred to as Out of Band (OOB) management.

what is Management Access and Authentication?

500

The standard covering all things Ethernet developed by the Intstitution of Electrical and Electronics Engineers

What is IEEE 802.3?

500

A topology in which all computers would listen to see if there was any transmission happening. If none was, it was free to send

What is a Bus Topology?

500
A Firewall which allows connections to internal devices as long as the connection originated inside the network on that device

What is a Stateful Firewall?

500

The poisonous plant which Socrates used to kill himself

What is Hemlock?

M
e
n
u