100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CCNA 200-301 Exam/432 Questions and answers $15.49   Add to cart

Exam (elaborations)

CCNA 200-301 Exam/432 Questions and answers

 7 views  0 purchase
  • Course
  • CCNA 200-301
  • Institution
  • CCNA 200-301

CCNA 200-301 Exam/432 Questions and answers

Preview 4 out of 34  pages

  • October 18, 2024
  • 34
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CCNA 200-301
  • CCNA 200-301
avatar-seller
Nursephil2023
CCNA 200-301 Exam/432
Questions and answers
AAA - -Authentication, authorization and accounting

-AAA Server - -Server providing authentication, authorization and
accounting services

-Access Control Entry (ACE) - -One line in an access control list (ACL)

-access interface - -A LAN network design term that refers to a switch
interface connected to end-user devices

-access layer - -In a Campus LAN design, the switches that connect directly
to end-point devices

-access link (WAN) - -A physical link between a service provider and its
customer

-access rate - -The speed at which bits are sent over an access link

-accounting - -In security, the recording of access attempts

-ACI - -Application Centric Infrastructure

-ACL - -Access Control List

-Active Directory - -A popular set of identity and directory services from
Microsoft, used in part to authenticate users

-administrative distance - -In Cisco routers, a means for one router to
choose between multiple routes to reach the same subnet when those routes
are learned by different routing protocols.

-agent - -Generally, an additional software process or component running in
a computing device for some specific purpose

-agent-based architecture - -An architecture that uses a software agent
inside the device being managed

-agentless architecture - -An architecture that does not need a software
agent

, -amplification attack - -A reflection attack that leverages a service on the
reflector to generate and reflect huge volumes of reply traffic to the victim

-Ansible - -A popular configuration management application

-Ansible inventory - -Device host names along with information about each
device

-Ansible playbook - -Files with actions and logic about what Ansible should
do

-anti-replay - -Preventing a man in the middle from copying and later
replaying the packets sent by a legitimate user, for the purpose of appearing
to be a legitimate user

-antivirus - -Software that monitors files transferred by any means, to look
for content that can be used to place a virus into the computer

-APIC - -Application Policy Infrastructure Controller

-APIC-EM - -Application Policy Infrastructure Controller -Enterprise Module

-Application Centric Infrastructure (ACI) - -Cisco's data center SDN solution

-Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) - -
The software that plays the role of controller in an enterprise network of
Cisco devices

-application programming interface (API) - -A software mechanism that
enables software components to communicate with each other

-application signature - -With Network Based Application Recognition
(NBAR), the definition of a combination of matchable fields that identify as
characteristics of a specific application

-Application Visibility and Control (AVC) - -A firewall device with advance
features (IPS, malware detection, VPN termination, etc.)

-application-specific integrated circuit (ASIC) - -An integrated circuit (chip)
designed for a specific purpose of application.

-AR - -Access Rate

-ARP - -Address Resolution Protocol. An internet protocol used to map an IP
address to a MAC address

, -ARP ACL - -A configuration feature on Cisco LAN switches that define MAC
and IP that will be filtered

-ARP Reply - -An ARP message used to supply information about an ARP
request. A device providing its MAC address in reply to a request

-ARP Request - -An ARP message used to request information from another
host located on the same subnet or broadcast domain

-ARP Table - -A list of IP addresses of neighbors on the same VLAN, along
with their MAC addresses

-ASAv - -A Cisco ASA firewall software image that runs as a virtual machine
rather than on hardware

-ASIC - -Application Specific Integrated Circuit

-authentication - -In security, the verification of the identity of a person,
device or process

-Authoritative DNS server - -The DNS server with the record that lists the
address that corresponds to a domain name (A Record) for that domain

-authorization - -In security, the determination of the rights allowed for a
particular user or device

-autonomous system (AS) - -An internetwork that is managed by one
organization

-autonomous system number (ASN) - -A number used by BGP to identify a
routing domain, often a single enterprise or organization.

-AutoQoS - -In Cisco switches and routers, an IOS feature that configures a
variety of QoS features with useful settings as defined by design guides

-bandwidth - -The speed at which bits can be sent and received over a link

-bandwidth profile - -In MetroEthernet, a contractual definition of the
amount of traffic that the customer can send into the service and receive out
of the service

-Brownfield - -A term that refers to the choice to add new configuration to
hardware and software that are already in use, rather than adding new
hardware and software specifically for a new project

, -brute-force attack - -An attack where a malicious user runs software that
tries every possible combination of letters, numbers and special characters
to guess a user's password

-buffer overflow attack - -An attack meant to exploit a vulnerability in
processing inbound traffic such that the target system's buffers overflow, the
target system can end up crashing or inadvertently running malicious code
injected by the attacker

-cable internet - -An internet access technology that uses a cable TV
(CATV), normally used for video, to send and receive data

-cacheable - -For resources that might be repeatedly requested over time,
an attribute that means that the requesting host can keep in storage (cache)
a copy of the resource for a specified amount of time

-carrier Ethernet - -A WAN service that uses Ethernet links as the access
link between the customer and the service provider

-CDP - -Cisco Discrovery Protocol. A media- and protocol-independent
device-discovery protocol that runs on most Cisco-manufactured equipment,
including routers, access servers, and switches. Using CDP, a device can
advertise its existence to other devices and receive information about other
devices on the same LAN or on the remote side of a WAN

-CDP neighbor - -A device on the other end of some communications cable
that is advertising CDP updates

-central office (CO) - -A term used by telcos to refer to a building that holds
switching equipment, into which the telco's cable plant runs so that the telco
has cabling from each home and business into the building

-centralized control plane - -An approach to architecting network protocols
and products that places the control plane functions into a centralized
function rather than distributing the function across the networking device

-Chef - -A popular configuration management application, which uses a
server and a pull model with in-device agents

-Chef client - -Any device whose configuration is being managed by Chef

-Chef Cookbook - -A set of recipes about the same kinds of work, grouped
together for easier management and sharing

-Cisco Access Control Server (ACS) - -A legacy Cisco product that acts as a
AAA Server

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursephil2023. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

60281 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart