Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Glossary 179<br />
Extensible Authentication Protocol over Wireless (EAPoW) When EAPoL<br />
messages are encapsulated over 802.<strong>11</strong> wireless frames, they are known as<br />
EAPoW.<br />
Fast Ethernet The standard speed of 100 Mbps, coaxial, or twisted pair cable.<br />
File Server A client/server role that allows clients to save data to folders on its<br />
hard drive.<br />
Firewall A device that protects a secure internal network from a public insecure<br />
network. Firewalls have the ability to control the traffic that is sent<br />
from an external network, such as the Internet, to an internal network or<br />
local computer.<br />
Full Duplex A term that refers to data traveling in both directions simultaneously.<br />
Gateway A bridge connecting two dissimilar systems.<br />
Gigabit Ethernet The standard speed of 1 Gbps, twisted-pair or fiber-optic cable.<br />
Half Duplex A term that refers to data traveling both ways, but in only one<br />
direction at a time.<br />
Hardware Loopback Adapter A tool that provides a way to test the ports on a<br />
system without having to connect to an external device.<br />
Hub A device that passes data to other computers or networks. Hubs, or concentrators,<br />
are central devices where network cabling is connected. Multiple<br />
cables connect into the hub, providing a method for data to be passed from<br />
one cable to another.<br />
Integrated Services Digital Network (ISDN) A system of digital telephone connections<br />
that enables data to be transmitted simultaneously end to end.<br />
Intrusion Detection System (IDS) A device designed to inspect and detect the<br />
kinds of traffic or network behavior patterns that match known attack signatures<br />
or that suggest potential unrecognized attacks may be incipient or in<br />
progress.<br />
Load Balancer A device that will distribute connection load between multiple<br />
devices in your environment that are serving the same function.<br />
Local Connector (LC) A connector used with fiber-optic cabling.<br />
Logical Link Control (LLC) A sublayer of the data link layer of the OSI model.<br />
The LLC provides the logic for the data link layer.<br />
Man-in-the-Middle Through Rogue Access Points Interception of network<br />
communications through deployment of an access point (AP) with enough<br />
strength so that the end users may not be able to tell which AP is the authorized<br />
one that they should be using.<br />
Mechanical Transfer Registered Jack (MTRJ) A connector used with fiber-optic<br />
cabling.<br />
Media Cables or wireless technologies that carry the data across the network.<br />
Media Access Control (MAC) A sublayer of the data link layer of the OSI model.<br />
It provides control for accessing the transmission medium.