100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CCNA 200-301 Questions And Answers Graded A+ $7.99
Add to cart

Exam (elaborations)

CCNA 200-301 Questions And Answers Graded A+

 6 views  0 purchase
  • Course
  • CCNA 200-301
  • Institution
  • CCNA 200-301

application signature - ️️With Network Based Application Recognition (NBAR), the definition of a combination of matchable fields that identify as characteristics of a specific application access interface - ️️A LAN network design term that refers to a switch interface connected to end-u...

[Show more]

Preview 4 out of 33  pages

  • September 17, 2024
  • 33
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CCNA 200-301
  • CCNA 200-301
avatar-seller
ACADEMICMATERIALS
CCNA 200-301
application signature - ✔️✔️With Network Based Application Recognition (NBAR), the
definition of a combination of matchable fields that identify as characteristics of a
specific application

access interface - ✔️✔️A LAN network design term that refers to a switch interface
connected to end-user devices


Access Control Entry (ACE) - ✔️✔️One line in an access control list (ACL)


access layer - ✔️✔️In a Campus LAN design, the switches that connect directly to end-
point devices

access link (WAN) - ✔️✔️A physical link between a service provider and its customer

access rate - ✔️✔️The speed at which bits are sent over an access link

accounting - ✔️✔️In security, the recording of access attempts

AAA - ✔️✔️Authentication, authorization and accounting

ACI - ✔️✔️Application Centric Infrastructure

ACL - ✔️✔️Access Control List

Active Directory - ✔️✔️A popular set of identity and directory services from Microsoft,
used in part to authenticate users

administrative distance - ✔️✔️In Cisco routers, a means for one router to choose
between multiple routes to reach the same subnet when those routes are learned by
different routing protocols.

agent - ✔️✔️Generally, an additional software process or component running in a
computing device for some specific purpose

agent-based architecture - ✔️✔️An architecture that uses a software agent inside the
device being managed

agentless architecture - ✔️✔️An architecture that does not need a software agent

,amplification attack - ✔️✔️A reflection attack that leverages a service on the reflector to
generate and reflect huge volumes of reply traffic to the victim

Ansible - ✔️✔️A popular configuration management application

Ansible inventory - ✔️✔️Device host names along with information about each device

Ansible playbook - ✔️✔️Files with actions and logic about what Ansible should do

AAA Server - ✔️✔️Server providing authentication, authorization and accounting
services

anti-replay - ✔️✔️Preventing a man in the middle from copying and later replaying the
packets sent by a legitimate user, for the purpose of appearing to be a legitimate user

antivirus - ✔️✔️Software that monitors files transferred by any means, to look for
content that can be used to place a virus into the computer

APIC - ✔️✔️Application Policy Infrastructure Controller

APIC-EM - ✔️✔️Application Policy Infrastructure Controller -Enterprise Module

Application Centric Infrastructure (ACI) - ✔️✔️Cisco's data center SDN solution

Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) - ✔️✔️The
software that plays the role of controller in an enterprise network of Cisco devices

application programming interface (API) - ✔️✔️A software mechanism that enables
software components to communicate with each other


Application Visibility and Control (AVC) - ✔️✔️A firewall device with advance features
(IPS, malware detection, VPN termination, etc.)

application-specific integrated circuit (ASIC) - ✔️✔️An integrated circuit (chip) designed
for a specific purpose of application.

AR - ✔️✔️Access Rate

ARP - ✔️✔️Address Resolution Protocol. An internet protocol used to map an IP
address to a MAC address

ARP ACL - ✔️✔️A configuration feature on Cisco LAN switches that define MAC and
IP that will be filtered

,ARP Reply - ✔️✔️An ARP message used to supply information about an ARP request.
A device providing its MAC address in reply to a request

ARP Request - ✔️✔️An ARP message used to request information from another host
located on the same subnet or broadcast domain


ASAv - ✔️✔️A Cisco ASA firewall software image that runs as a virtual machine rather
than on hardware

ASIC - ✔️✔️Application Specific Integrated Circuit

authentication - ✔️✔️In security, the verification of the identity of a person, device or
process

Authoritative DNS server - ✔️✔️The DNS server with the record that lists the address
that corresponds to a domain name (A Record) for that domain

authorization - ✔️✔️In security, the determination of the rights allowed for a particular
user or device

autonomous system (AS) - ✔️✔️An internetwork that is managed by one organization

autonomous system number (ASN) - ✔️✔️A number used by BGP to identify a routing
domain, often a single enterprise or organization.

AutoQoS - ✔️✔️In Cisco switches and routers, an IOS feature that configures a variety
of QoS features with useful settings as defined by design guides

bandwidth - ✔️✔️The speed at which bits can be sent and received over a link

bandwidth profile - ✔️✔️In MetroEthernet, a contractual definition of the amount of
traffic that the customer can send into the service and receive out of the service

Brownfield - ✔️✔️A term that refers to the choice to add new configuration to hardware
and software that are already in use, rather than adding new hardware and software
specifically for a new project

brute-force attack - ✔️✔️An attack where a malicious user runs software that tries
every possible combination of letters, numbers and special characters to guess a user's
password

, buffer overflow attack - ✔️✔️An attack meant to exploit a vulnerability in processing
inbound traffic such that the target system's buffers overflow, the target system can end
up crashing or inadvertently running malicious code injected by the attacker

cable internet - ✔️✔️An internet access technology that uses a cable TV (CATV),
normally used for video, to send and receive data

cacheable - ✔️✔️For resources that might be repeatedly requested over time, an
attribute that means that the requesting host can keep in storage (cache) a copy of the
resource for a specified amount of time

carrier Ethernet - ✔️✔️A WAN service that uses Ethernet links as the access link
between the customer and the service provider

CDP - ✔️✔️Cisco Discrovery Protocol. A media- and protocol-independent device-
discovery protocol that runs on most Cisco-manufactured equipment, including routers,
access servers, and switches. Using CDP, a device can advertise its existence to other
devices and receive information about other devices on the same LAN or on the remote
side of a WAN

CDP neighbor - ✔️✔️A device on the other end of some communications cable that is
advertising CDP updates

central office (CO) - ✔️✔️A term used by telcos to refer to a building that holds
switching equipment, into which the telco's cable plant runs so that the telco has cabling
from each home and business into the building

centralized control plane - ✔️✔️An approach to architecting network protocols and
products that places the control plane functions into a centralized function rather than
distributing the function across the networking device

Chef - ✔️✔️A popular configuration management application, which uses a server and
a pull model with in-device agents

Chef client - ✔️✔️Any device whose configuration is being managed by Chef

Chef Cookbook - ✔️✔️A set of recipes about the same kinds of work, grouped together
for easier management and sharing

Cisco Access Control Server (ACS) - ✔️✔️A legacy Cisco product that acts as a AAA
Server

Cisco AnyConnect Secure Mobility Client - ✔️✔️Cisco software product used as client
software on user devices to create a VPN

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

53920 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added