Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
cloud computing:
|
A pay-per user computing model in which customers pay only for the computing resources that they need, and the resources can be easily scaled.
|
|
disabling unused ports:
|
A security technique to turn off ports on a network device that are not required.
|
|
file transfer protocol:
|
An unsecure TCP/IP protocol that is commonly used for transferring files.
|
|
flood guard:
|
A feature that controls a devices tolerance for unanswered service requests and helps to prevent a DoS attack.
|
|
FTPS:
|
A TCP/IP protocol that uses Secure Sockets Layer/ Transport Layer Security (SSL/TLS) to encrypt commands sent over the control port (Port 21) in an FTP session.
|
|
IEEE 802.1x:
|
A standard that blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server.
|
|
Internet Control Message Protocol (ICMP):
|
A TCP/IP protocol that is used by devices to communicate updates or error information to other devices.
|
|
Internet Protocol version 6(IPv6):
|
The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements.
|
|
IP telephony:
|
Using a data-based IP network to add digital voice clients and new voice applications onto the IP network.
|
|
loop protection:
|
Preventing broadcast storms by using the IEEE 802.1d standard spanning tree algorithm (STA)
|
|
MAC limiting and filtering:
|
A security technique to limit the number of media access control (MAC) addresses allowed on a single port.
|
|
rule-based management:
|
The process of administration that relies on following procedural and technical rules.
|
|
Secure Copy Protocol(SCP):
|
A TCP/IP protocol used mainly on unix and linux devices tht securely transports files by encrypting files and commands.
|
|
SFTP:
|
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.
|
|
Simple Network Management Protocol (SNMP):
|
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrator to remotely monitor, manage, and configure devices on the network.
|
|
Transmission Control Protocol/Internet Protocol(TCP/IP):
|
The most common protocol suite used today for local area networks (LANs) and the internet.
|
|
virtualization:
|
A means of managing and presenting computer resources by function without regard to their physical layout or location.
|