Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
85 Cards in this Set
- Front
- Back
Host
|
Any computer attached to the Internet (can be either personal client or server).
|
|
Protocol
|
is a set of rules which is used by computers to communicate with each other across a network.
|
|
Client/server
|
describes the relationship between two computer programs in which one program, the client, makes a service request from
|
|
File transfer protocol (FTP)
|
is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet.. Streaming media are multimedia that are constantly received by, and normally presented to, an end-user while being delivered by a streaming provider (the term "presented" is used in this article in a general sense that includes audio or video playback)
|
|
Voice over IP (VoIP)
|
The transmission of voice signals over an IP network.
|
|
Peer-to-Peer Architecture (P2P)
|
The application architecture in which most or all of the work is done by cooperating user computers, such as desktop PCs. If servers are present at all, they serve only facilitating roles and do not control the processing.
|
|
Enterprise resource planning (ERP)
|
is an integrated computer-based system used to manage internal and external resources including tangible assets, financial resources, materials, and human resources
|
|
Quality of Service (QoS)
|
Numerical service targets that must be met by networking staff.
|
|
Bits Per Second (BPS)
|
a measurement unit for the rate of speed for a computer sound file, related to the quality of sound the faster the bps the higher the quality of sound
|
|
Multiplexing
|
1) Having the packets of many conversations share trunk lines; reduces trunk line cost. 2) The ability of a protocol to carry messages from multiple next-higher-layer protocols in a single communication session.
|
|
The Systems Development Life Cycle (SDLC)
|
in systems engineering and software engineering, is the process of creating or altering systems and the models and methodologies that people use to develop these systems. The concept generally refers to computer orinformation systems.
|
|
Latency
|
Delay, usually measured in milliseconds.
|
|
Cryptography
|
Mathematical methods for protecting communication.
|
|
Internet Service Provider(ISP)
|
Carrier that provides Internet access and transmission.
|
|
Network Access Point (NAP)
|
A site where ISPs interconnect and exchange traffic
|
|
Domain Name System (DNS)
|
A server that provides IP addresses for users who know only a target host’s host name. DNS servers also provide a hierarchical system for naming domains.
|
|
Wide Area Network (WAN)
|
A network that links different sites together.
|
|
Simple Network Management Protocol (SNMP)
|
The protocol that allows a general way to collect rich data from various managed devices in a network.
|
|
Semantics
|
In message exchange, the meaning of each message
|
|
Syntax
|
In message exchange, how messages are organized.
|
|
Data Field
|
The content delivered in a message.
|
|
Network Architecture
|
1) A broad plan that specifies everything that must be done for two application programs on different networks on an internet to be able to work together effectively. 2) A broad plan for how the firm will connect all of its computers within buildings (LANs), between sites (WANs), and to the Internet; also includes security devices and services.
|
|
The Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
|
is an abstract description for layered communications and computer network protocol design
|
|
Octet
|
refers to an entity having exactly eight bits
|
|
Hops
|
In computer networking a hop represents one portion of the path between source and destination.
|
|
User Datagram Protocol (UDP)
|
Unreliable transport-layer protocol in TCP/IP
|
|
Decapsulation
|
The removing of a message from the data field of another message.
|
|
Propagation
|
The transmission (spreading) of signals from one place to another.
|
|
Attenuation
|
The degeneration of a signal over distance on a network cable is called attenuation.
|
|
Baud Rate
|
The number of clock cycles a transmission system uses per second.
|
|
Electromagnetic Interference (EMI)
|
Unwanted electrical energy coming from external devices, such as electrical motors, fluorescent lights, and even nearby data transmission wires.
|
|
Parallel Transmission
|
A form of transmission that uses multiple wire pairs or other transmission media simultaneously to send a signal; increases transmission speed.
|
|
Dead spot
|
A location where a receiver cannot receive radio transmission, due to an obstruction blocking the direct path between sender and receiver.
|
|
Topology
|
The way in which nodes are linked together by transmission lines.
|
|
Baseband
|
Transmission in which the signal is simply injected into a wire.
|
|
Broadband
|
1) Transmission where signals are sent in wide radio channels; 2) any highspeed transmission system.
|
|
Ethernet
|
is a family of frame-based computer networking technologies for local area networks (LANs).
|
|
Media Access Control (MAC)
|
The process of controlling when stations transmit; also, the lowest part of the data link layer, defining functionality specific to a particular LAN technology
|
|
Virtual LAN (VLAN)
|
A closed collection of servers and the clients they serve. Broadcast signals go only to computers in the same VLAN.
|
|
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
|
The process wherein if a station wants to transmit, it may do so if no station is already transmitting but must wait if another station is already sending. In addition, if there is a collision because two stations send at the same time, all stations stop, wait a random period of time, and then try again.
|
|
Wireless LAN (WLAN)
|
A local area network that uses radio (or rarely, infrared) transmission instead of cabling to connect devices.
|
|
Access Point
|
A bridge between a wireless station and a wired LAN
|
|
Bluetooth
|
A wireless networking standard created for personal area networks
|
|
Spectrum
|
The range of all possible frequencies from zero hertz to infinity
|
|
Carrier Sense Multiple Access with Collision Avoidance and Acknowledgements (CSMA/CA+ACK)
|
A mandatory mechanism used to reduce problems with multiple simultaneous transmissions, which occur in wireless transmission. CSMA/CA+ACK is a media access control discipline, and it uses both collision avoidance and acknowledgement frames
|
|
Multiple Input/Multiple Output (MIMO)
|
A radio transmission method that sends several signals simultaneously in a single radio channel.
|
|
Wardriving
|
is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA
|
|
WEP security
|
is a deprecated algorithm to secure IEEE 802.11 wireless networks
|
|
Rogue access point
|
is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator
|
|
Virtual Private Network (VPN)
|
A network that uses the Internet with added security for data transmission.
|
|
Personal Area Network(pan)
|
Based on the electric-field transmission medium, is an technology that allows individuals to exchange data with a simple touch or grasp
|
|
Radio Frequency ID (RFID)
|
A tag that can be read at a distance by a radio transmitter/receiver.
|
|
Public Switched Telephone Network (PSTN)
|
The worldwide telephone network
|
|
Dial-up Internet access
|
is a form of Internet access that uses telephone lines
|
|
Leased line
|
is service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two locations in exchange for a monthly rent (hence the term lease
|
|
Digital Subscriber Line (DSL)
|
A technology that provides digital data signaling over the residential customer’s existing single-pair UTP voice-grade copper access line.
|
|
INTERNAL & BORDER ROUTERS
|
is a device that interconnects two or more computer networks, and selectively interchanges packets of data between them
|
|
Subnet Mask
|
A mask with 1s in the network and subnet parts and zeros in the host part.
|
|
ROUTING TABLE
|
is an electronic table (file) or database type object that is stored in a router or a networked computer
|
|
Compromise
|
A successful attack.
|
|
Malware
|
Software that seeks to cause damage.
|
|
Virus
|
A piece of executable code that attaches itself to programs or data files. When the program is executed or the data file opened, the virus spreads to other programs or data files.
|
|
Worm
|
An attack program that propagates on its own by seeking out other computers, jumping to them, and installing itself
|
|
Trojan Horse
|
A program that looks like an ordinary system file, but continues to exploit the user indefinitely.
|
|
Spam
|
Unsolicited commercial e-mail.
|
|
Social Engineering
|
Tricking people into doing something to get around security protections.
|
|
Hacking
|
The intentional use of a computer resource without authorization or in excess of authorization.
|
|
Denial-of-service attack (DoS) or Distributed denial-of-service attack (DDoS )
|
is an attempt to make a computer resource unavailable to its intended users
|
|
Defense in Depth
|
The use of successive lines of defense
|
|
Credentials
|
Proof of identity that an applicant can present during authentication.
|
|
Private Key
|
A key that only the true party should know. Part of a public key–private key pair.
|
|
Public Key
|
A key that is not kept secret. Part of a public key–private key pair.
|
|
DIGITAL CERTIFICATE
|
an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so fort
|
|
BRUTE FORCE
|
is a strategy used to break the encryption of data.
|
|
Biometrics
|
The use of bodily (Finger) measurements to identify an applicant.
|
|
Intrusion Detection System (IDS)
|
A security system that examines messages traveling through a network. IDSs look at traffic broadly, identifying messages that are suspicious. Instead of discarding these packets, IDSs will sound an alarm.
|
|
Intrusion Protection System (IPS)
|
Firewall system that uses sophisticated packet filtering methods to stop attacks.
|
|
Encryption
|
is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge,
|
|
Electronic Signature
|
A bit string added to a message to provide message-by-message authentication and message integrity.
|
|
Group Policy Object (GPO)
|
A policy that governs a specific type of resource on a domain
|
|
Network Address Translation (NAT)
|
Converting an IP address into another IP address, usually at a border firewall; disguises a host’s true IP address from sniffers. Allows more internal addresses to be used than an ISP supplies a firm with external addresses.
|
|
Domain Name System (DNS)
|
A server that provides IP addresses for users who know only a target host’s host name. DNS servers also provide a hierarchical system for naming domains.
|
|
Dynamic Host Configuration Protocol (DHCP)
|
The protocol used by DHCP servers, which provide each user PC with a temporary IP address to use each time he or she connects to the Internet.
|
|
Simple Network Management Protocol (SNMP)
|
The protocol that allows a general way to collect rich data from various managed devices in a network.
|
|
Sniffer
|
computer software or hardware that can intercept and log traffic passing over a digital network
|