Across
- 5. a layer 3 device that makes forwarding decisions based on logical network addresses
- 6. IEEE 802.3AD standard, a process that allows multiple physical connections to be logically bundled into a single logical connection
- 8. IEEE 802.1D standard, allows for redundant Layer 2 connections while logically preventing loops
- 9. the process of distributing network prefix information through a network so that traffic can be forwarded to network destinations
- 10. in a network using 802.1X user authentication, the device that wants to gain access to a network
- 11. a connection that allows a device to either receive or transmit data at any one time
- 13. a routing protocol that operates within a network under a single administrative control
- 15. specialized network devices that permit the central control and management of large numbers of lightweight access points
- 20. a system that seeks to alert administrators regarding a cybersecurity attack but that typically does not prevent the attack through its own actions
- 21. a WLAN with one access point in infrastructure mode
- 22. the specific frequencies that are capable of carrying modern WiFi
- 23. a technology for wireless communication that relies on multiple users or terminals, each radioing over one or more antennas to communicate with one another
- 24. in a network using 802.1X user authentication, this device forwards an authentication request on to the authentication server
- 25. a value assigned to a route, the lower the value the more preferred a route is
- 26. a process in which two wireless bands are logically bonded together, allows for increased bandwidth
- 28. a distance-vector routing protocol that uses hop count as the metric
- 33. a style of Wifi antenna that directs the signal in a specific direction
- 37. an administratively configured entry in a router's routing table that specifies where traffic for all unknown networks should be sent
- 38. a network device that learns which devices reside off which ports
- 39. a system that seeks to recognize attack traffic and prevent that traffic from entering a network or devices
- 40. a routing protocol that operates between autonomous systems
- 42. enables you to control the maximum rate of IP traffic sent/received on an interface
- 43. specialized network device that can assist with performance and high availability of key network devices and services
- 44. a feature of distance-vector routing protocol that prevents a route learned on one interface from being advertised back out the same interface
- 45. a process that allows routes learned by one routing protocol to be injected into the routing process of another routing protocol
Down
- 1. a broadcast asking for the MAC address corresponding to a known IP address
- 2. a bandwidth management technique that delays the flow of certain types of network packets in order to ensure network performance for higher priority applications
- 3. a network device at Layer 1 of the OSI model that receives bits on one port and retransmits those bits out all other ports
- 4. an IP address on the next router to which traffic should be forwarded
- 7. an antenna that radiates power at relatively equal power levels in all directions
- 12. a category of routing protocol that maintains a topology of a network and uses an algorithm to determine the shortest path to a destination network
- 14. a feature of distance-vector routing protocol that causes a route received on one interface to be advertised back out that same interface with a metric that is considered to be infinite
- 16. a connection that allows a device to simultaneously transmit and receive data
- 17. a routing protocol's index of believability
- 18. a WLAN created without the use of an access point such as when in ad hoc mode
- 19. a type of routing protocol that determines the best route for data packets based on distance
- 27. connects the VoIP of an enterprise to the global public telephone network
- 29. a single broadcast domain, representing a single subnet, represented by a group of ports on a switch
- 30. typically found in the headquarters of an enterprise network that terminates VPN connections from remote clients and/or branch offices
- 31. a technology that uses multiple antennas for transmission and reception
- 32. a single physical or logical connection that simultaneously carries traffic for multiple VLANs
- 34. a feature of modern WLANs that permits users to move throughout an organization without losing WiFi access as they transition to different WiFi cells and equipment
- 35. a WLAN with more than one access point in infrastructure mode
- 36. joins two or more LAN segments and each LAN segment is in a separate collision domain
- 41. a server that intercepts requests being sent from a client and forwards those requests to their intended destination