IT2 Final Exam Review Crossword
Across
- 2. A hub for a wireless network. As with a hub, any message sent to any wireless host connected to this can be received by all other wireless hosts.
- 5. A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
- 7. A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. Used primarily to support secure communications over an untrusted network.
- 10. A temporary, interactive communication between two or more systems, such as a client and a server, or between personal computers.
- 11. Impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw.
- 15. A hardware device that provides a way to connect a computer to the network medium. It is responsible for converting binary data into a format that can be sent on the network medium. Also called a network adapter.
- 18. Sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.
- 20. Defines where data packets that are leaving the network should go to be routed.
- 21. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 22. A network that connects several LANs. Often limited to a corporation or an organization but are sometimes accessible to the public.
- 24. A protocol used to centrally manage the distribution of IP addresses within a network.
- 25. A multi-port bridge that performs filtering based on MAC addresses and provides additional features not found in a bridge.
- 28. One of the main internet protocols. It allows computing devices and application devices to exchange messages over a network.
- 30. An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
- 31. External signals that interfere with normal network communications. When working with the radio frequency spectrum, this is known as Radio Frequency Interference (RFI).
- 32. Hosts use this to discover the MAC address of a device from its IP address.
Down
- 1. A protocol optimized for the transmission of voice data (telephone calls) through a packet-switched IP network. Routes phone calls through an IP network, including the internet.
- 3. A type of software designed to take over or damage a computer without the user's knowledge or approval.
- 4. A unique identifier burned into the ROM of every Ethernet NIC. The first half of it (the first six digits) is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value that identifies the host address.
- 6. The central connecting point of a physical star. It uses a logical bus topology. All messages are sent to all other hosts regardless of who is supposed to get the message.
- 8. A 128-bit alphanumeric addressing method that contains 8 header fields and uses NDP. It does not contain checksum fields or support broadcast or variable length subnet mask.
- 9. A collection of many networks owned by many entities that share information and communicate together.
- 12. Dedicated block-based storage, leveraging a high-speed architecture that interconnects and delivers shared pools of storage devices to multiple servers. Makes its data act as if it were locally attached.
- 13. The main function of this is to translate domain names into IP addresses, which computers can understand.
- 14. A unit of data that is ready to be sent on the network medium.
- 16. An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
- 17. A method for providing fault tolerance by using duplicate or multiple components that perform the same function.
- 19. An address that identifies the network and host address assigned to a device.
- 23. The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keyboards
- 25. An address that identifies the network and host address assigned to a device.
- 26. A device that connects two or more network segments or subnets.
- 27. The ability to respond to an unexpected hardware or software failure without loss of data or loss of operation.
- 29. A reference model for how applications communicate over a network without regard to its underlying internal structure and technology.