• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
cloud computing:
A pay-per user computing model in which customers pay only for the computing resources that they need, and the resources can be easily scaled.
disabling unused ports:
A security technique to turn off ports on a network device that are not required.
file transfer protocol:
An unsecure TCP/IP protocol that is commonly used for transferring files.
flood guard:
A feature that controls a devices tolerance for unanswered service requests and helps to prevent a DoS attack.
FTPS:
A TCP/IP protocol that uses Secure Sockets Layer/ Transport Layer Security (SSL/TLS) to encrypt commands sent over the control port (Port 21) in an FTP session.
IEEE 802.1x:
A standard that blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server.
Internet Control Message Protocol (ICMP):
A TCP/IP protocol that is used by devices to communicate updates or error information to other devices.
Internet Protocol version 6(IPv6):
The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements.
IP telephony:
Using a data-based IP network to add digital voice clients and new voice applications onto the IP network.
loop protection:
Preventing broadcast storms by using the IEEE 802.1d standard spanning tree algorithm (STA)
MAC limiting and filtering:
A security technique to limit the number of media access control (MAC) addresses allowed on a single port.
rule-based management:
The process of administration that relies on following procedural and technical rules.
Secure Copy Protocol(SCP):
A TCP/IP protocol used mainly on unix and linux devices tht securely transports files by encrypting files and commands.
SFTP:
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.
Simple Network Management Protocol (SNMP):
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrator to remotely monitor, manage, and configure devices on the network.
Transmission Control Protocol/Internet Protocol(TCP/IP):
The most common protocol suite used today for local area networks (LANs) and the internet.
virtualization:
A means of managing and presenting computer resources by function without regard to their physical layout or location.