Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Bandwidth |
The maximum data transmission capacity over a network, measured by bits per second |
|
Data Packet |
A basic unit of information that travels from one device to another within a network |
|
Hub |
A network device that broadcasts information to every device on the network |
|
I.P. Address |
A unique string of characters that identifies the location of a decice on the internet |
|
L.A.N. Local Area Network |
A network that spans small areas like an office building, a school, or a home |
|
Modem |
A device that connects your router to the internet and brings internet access to the LAN |
|
Network |
A group of connected devices |
|
Packet Sniffing |
The practice of capturing and inspecting data packets across a network |
|
Port |
A Software-based location that organizes the sending and receiving of data between devices on a network |
|
Switch |
A device that makes connections between specific devices on a network by sending and receiving data between them |
|
Transmission Control Protocol |
An internet communication protocol that allows two devices to form a connection and stream data |
|
User Datagram Protocol |
A connectionless protocol that dows not establish a connection between devices before transmissions |
|
Wide Area Network |
A network that smans a large geographic area like a city, state, or country |
|
Baseline Configuration |
A document et of specifications within a system that is used as a basis for builds, releases, and updates |
|
Bluetooth |
Used for wireless communication with nearby physical devices |
|
Cloud Network |
A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet |
|
Firewall |
A network security device that monitors traffic to or from your network |
|
I.A.M. Identity Access Management |
A collection of processes and technologies that helps organizations manage digital identities in their environement |
|
I.C.M.P. Flood |
A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server |
|
I.P. Spoofing |
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network |
|
Security Zone |
A segment of a conpany's network that protcts the internal network from the internet |
|
Smurf Attack |
A network attack performed when an attacker sniffs an authorized user's IP address and floods it with ICMP packets |
|
SYN flood attack |
A type of DoS attack that simulates a T.C.P./I.P. connection and floods a server with SYN packets |
|
Wi-Fi Protected Access W.P.A. |
A wireless security protocol for devices to connect to the internet |