Documente Academic
Documente Profesional
Documente Cultură
CISCO Vocabulary 1
ENGLISH
1. Network
RED
SPANISH
EXAMPLE
2. Layer
3. Framework
4. Gathering
CAPA
MARCO
REUNION
5. Groupware
TRABAJO EN GRUPO
6. Constraints
7. Throughput
LIMITACIONES
RENDIMIENTO
8. Responsiveness
RESPUESTA ADEMAS
9. Bandwidth
ANCHO DE BANDA
10. Interface
11. Downstream
12. Upstream
13. Splitter
14. Coax
INTERFAZ
RIO ABAJO
RIO ARRIBA
DIVISOR
COAXIAL
15. Wireless
16. Frames
RADIO
MARCOS
17. Acknowledgment
RECONOCIMIENTO
18. Keystroke
GOLPE DE TECLADO
19. Host
ANFITRION
20. Multilink
21. Teleworker
22. Mask
23. Hierarchical
MULTILINEA
TRABAJADOR A
DISTANCIA
MASCARA
JERARQUICO
24. Routing
ENRUTAMIENTO
25. Protocol
PROTOCOLO
26. Bit
POCO
ADELANTE
28. Prefix
29. Multicast
30. Multihoming
31. Triggered
32. Flat
33. Deploy
34. Backbone
35. Filtering
36. Quantization
37. Companding
38. Switch
PREFIJO
MULTIASPECTO
MULTIPUERTO
PROVOCADO
PLANO
DESPLEGAR
COLUMNA
VERTEBRAL
FILTRADO
CUANTIZACION
DOMINANTE
INTERRUPTOR
39. Trunk
TRONCAL
40. Feature
CARACTERISTICAS
41. Gateway
PUERTA
42. Gatekeeper
MULTIFILTRO
43. Delay
44. Jitter
RETRASO
The ISP agrees to forward the companys trafc from the ISPs POP
to a company-run home gateway.
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
One-to-many IPv6 addresses are called multicast.
What is BGP multihoming?
What are triggered updates?
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Deploy EIGRP in both directions
What is the difference between an Integrated IS-IS backbone and
an OSPF backbone?
Filtering: Filters out the signals nonspeech frequency components.
Quantization: Converting an analog sample to a digital code word
Companding: Compressing and expanding signals
Voice gateway, also called a voice-enabled router or voice-enabled
switch
Trunk signaling is between PSTN switches, between a PSTN
switch and a PBX, or between PBX switches.
NO HAY SIGNIFICADO
Some multilayer switch features that are useful to the access layer
include the following
A voice port is an interface on a voice gateway that carries voice
data.
The gatekeeper provides call control services to registered H.323
endpoints within its zone.
Variation in the delay of received packets
Jitter Variation in the delay of received packets
CISCO Vocabulary 2
ENGLISH
SPANISH
45. Echo
ECO
46. Endpoint
47. Header
48. Overhead
49. Payload
DE EXTREMO
TITULAR
ARRIBA
CARGA UTIL
50. Logger
REGISTRADOR
51. Erlangs
52. Scattering
53. Diffraction
54. Multipath
55. Autonomous
MANDADOS
DISPERSION
DISFRACCION
MULTIPLE
AUTONOMO
56. Lightweight
LIGERO
EXAMPLE
Echo Audible leak of the callers voice into the
receive (return) path
If an endpoint device is noncompliant
The IPv6 packet header is 40 octets, or 320 bits.
Dynamic name resolution reduces administrative overhead.
G.729 has the most compression of the payload, but the IP
header is a constant 40 bytes. Therefore, G.729 has more IP
overhead relative to its payload.
If your call logger says that 290 calls are made on a trunk group in
the busiest hour and the average call duration is 180 seconds,
what is the busy hour trafc (in Erlangs)?
How many centum call seconds (CCS) equals ve Erlangs?
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
What is the difference between an autonomous AP and a
lightweight AP?
What is the difference between an autonomous AP and a
57. Authentication
58. Encryption
59. Port
60. Outbreak
61. Identification
62. Trust
63. Token
64. Proof
65. Firewall
66. Cryptography
67. Resource
AUTENTIFICACION
CIFRADO
PUERTO
BROTE
IDENTIFICACION
CONFIANZA
MUESTRA
PRUEBA
CORTAFUERGOS
CRIPTOGRAFIA
RECURSO
68. Pooled
COMUN
69. Leveraging
APROVECHAR
70. Scalability
ESCALABILIDAD
71. Performance
RENDIMIENTO
72. Manageability
73. Usability
CAPACIDAD DE
GESTION
USABILIDAD
74. Budget
PRESUPUESTO
75. Tightly
HERMETICAMENTE
76. Launched
LANZADO
77. Prototype
PROTOTIPO
78. Guidelines
79. Rollback
80. Entreprise
DIRECTRICES
REVERSION
EXPRESA
81. Branch
RAMA
82. Overlook
83. Syslog
SISTEMA DE
REGISTRO
LA DEPURACION
MALLA
84. Debugging
85. Meshed
lightweight AP?
What is the difference between authentication and authorization?
Cryptography provides condentiality through encryption.
What is a voice port?
To minimize and mitigate outbreaks
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Trust and identity management
Token: A physical device or software application
What are the three proofs on which authentication is based?
Cisco IOS Firewall
Cryptography provides condentiality through encryption.
Integration of networked resources and information assets that
have been largely unlinked
When the network infrastructure is converged, IT resources can be
pooled and shared
The objective of this layer is to meet business requirements and
achieve efciencies by leveraging the Interactive Services layer.
Scalability: Supports growth and expansion of organizational tasks
by separating functions and products into layers.
Performance: Provides the desired responsiveness, throughput,
and utilization on a per- application basis through the network
infrastructure and services.
Manageability: Provides control, performance monitoring, and
fault detection.
Provides for an effective balance between usability and security
while protecting information assets and infrastructure from inside
and outside threats.
The associated costs of investment and usage should stay within
the budget limits.
The new network design is often driven by the introduction of new
network applications; the implementation time frames for new
applications are often tightly connected and therefore inuence
the available time for network design.
A pilot network tests and veries the design before the network is
launched.
A prototype network tests and veries a redesign in an isolated
network before it is applied to the existing network.
Detailed rollback guidelines in case of failure
Detailed rollback guidelines in case of failure
What are some features of EIGRP that make it an appropriate
choice for an enterprise routing protocol?
Vendors can obtain their own branch of the MIB subtree and create
custom managed objects under that branch
Enterprises often overlook the Server Farm module from a security
perspective.
Syslog denes the following severity levels
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
The key rationale for creating a fully meshed network is to provide a
high level of redundancy
CUESTIONES
PAQUETE
COBRE
CISCO Vocabulary 3
ENGLISH
89. Twisted
SPANISH
RETORCIDO
90. Links
91. Binary
ENLACES
BINARIO
92. Dispatch
93. Browse
ENVIO
VER
94. Flexibility
95. Availability
FLEXIBILIDAD
DISPONIBILIDAD
EXAMPLE
With SDSL, trafc in either direction travels at the same speed over
a single Twisted twisted pair.
If WAN links are never congested, queuing is unnecessary.
PCM takes the PAM process one step further by encoding each
analog sample using binary code words.
DHCP is used to dispatch.
A user wants to browse www.cisco.com The host queries the DNS
server because it does not know that sites IP address.
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Using RSVP, applications request a certain amount of bandwidth
for a voice call across a network and receive an indication of the
outcome of the reservation based on actual resource availability.