08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Glossary 179<br />

Extensible Authentication Protocol over Wireless (EAPoW) When EAPoL<br />

messages are encapsulated over 802.<strong>11</strong> wireless frames, they are known as<br />

EAPoW.<br />

Fast Ethernet The standard speed of 100 Mbps, coaxial, or twisted pair cable.<br />

File Server A client/server role that allows clients to save data to folders on its<br />

hard drive.<br />

Firewall A device that protects a secure internal network from a public insecure<br />

network. Firewalls have the ability to control the traffic that is sent<br />

from an external network, such as the Internet, to an internal network or<br />

local computer.<br />

Full Duplex A term that refers to data traveling in both directions simultaneously.<br />

Gateway A bridge connecting two dissimilar systems.<br />

Gigabit Ethernet The standard speed of 1 Gbps, twisted-pair or fiber-optic cable.<br />

Half Duplex A term that refers to data traveling both ways, but in only one<br />

direction at a time.<br />

Hardware Loopback Adapter A tool that provides a way to test the ports on a<br />

system without having to connect to an external device.<br />

Hub A device that passes data to other computers or networks. Hubs, or concentrators,<br />

are central devices where network cabling is connected. Multiple<br />

cables connect into the hub, providing a method for data to be passed from<br />

one cable to another.<br />

Integrated Services Digital Network (ISDN) A system of digital telephone connections<br />

that enables data to be transmitted simultaneously end to end.<br />

Intrusion Detection System (IDS) A device designed to inspect and detect the<br />

kinds of traffic or network behavior patterns that match known attack signatures<br />

or that suggest potential unrecognized attacks may be incipient or in<br />

progress.<br />

Load Balancer A device that will distribute connection load between multiple<br />

devices in your environment that are serving the same function.<br />

Local Connector (LC) A connector used with fiber-optic cabling.<br />

Logical Link Control (LLC) A sublayer of the data link layer of the OSI model.<br />

The LLC provides the logic for the data link layer.<br />

Man-in-the-Middle Through Rogue Access Points Interception of network<br />

communications through deployment of an access point (AP) with enough<br />

strength so that the end users may not be able to tell which AP is the authorized<br />

one that they should be using.<br />

Mechanical Transfer Registered Jack (MTRJ) A connector used with fiber-optic<br />

cabling.<br />

Media Cables or wireless technologies that carry the data across the network.<br />

Media Access Control (MAC) A sublayer of the data link layer of the OSI model.<br />

It provides control for accessing the transmission medium.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!