Configuring Routing
&
Advanced Switching
Implementing Network Services
Application Services
Configuring Wireless Networks
Cloud Concepts
100

This protocol is a routing technology that modifies the network address in the packet header and allows multiple devices on a private network to share a single IP address 

NAT 

100

Time-sensitive communications where occasionally dropping packets is better than waiting

UDP

100

Establishes a secure connection between client and server by exchanging messages to verify each other's identity and agree on encryption methods

TLS

100

 Supports 2.4 GHz and 5 GHz, achieves up to 72 Mbps accommodates wider channel bandwidth

802.11n

100

Servers connect to multiple switches for redundancy using mesh topology

Spine and Leaf Topology

200

An enhanced distance-vector protocol that calculated the shortest path and easily transitions to IPv6 networks when necessary 

EIGRP 

200

A set of IP addresses statically set aside and and not assigned

DHCP Exclusions

200

KPI average time to fix and restore a failed system

MTTR

200

Wi-Fi standard Implements individualized date encryption for each device and makes brute force attacks more challenging

WPA3

200

Backbone for SANs

Fibre Channel

300

 Connects a customers internal network to a providers network acting as a security barrier for the customers network

Customer Edge Router (CE)

300

Uses ARP to assign unique IP addresses on local networks when DHCP unavailable

APIPA

300

Various algorithms used to reduce downtime and increase scalability to distribute network traffic across multiple servers

Load Balancers

300

Remote network protocol which transmits data in plain text only

Telenet

300

Highly secure isolated environments within a public cloud

VPCs - Virtual Private Clouds 

400

 Routing protocol which uses the best path algorithm, can be customized, and supports authentication

BGP

400

Encrypted data that uses only one channel and port 22

SFTP

400

Offers encryption and strong user authentication when monitoring devices on your network

SNMP v3

400

 Unauthorized wireless access point that’s been installed on the network without administrators permission

Rogue Access Point 

400

Networks created and modified without reconfiguring the original network - perfect to optimize traffic load for two branch offices

Overlay Network

500

A single connection which partitions a network into subnetworks and provides only one access point between each subnet

VLAN Trunking

500

Host on a network automatically configures a unique IPv6 address without any device keeping track of which address is assigned to which node

SLAAC

500

Where uptimes are crucial to your organization, ensures continuous operation to minimize downtime by providing redundancy

High Availability Clusters 

500

Used when fast and secure end-to-end communications between a client and server are needed and only the payload is encrypted

IPsec Transport Mode

500

architecture combining networking and security into a single cloud-delivered service at the network edge

SASE

M
e
n
u