• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/85

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

85 Cards in this Set

  • Front
  • Back
Host
Any computer attached to the Internet (can be either personal client or server).
Protocol
is a set of rules which is used by computers to communicate with each other across a network.
Client/server
describes the relationship between two computer programs in which one program, the client, makes a service request from
File transfer protocol (FTP)
is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet.. Streaming media are multimedia that are constantly received by, and normally presented to, an end-user while being delivered by a streaming provider (the term "presented" is used in this article in a general sense that includes audio or video playback)
Voice over IP (VoIP)
The transmission of voice signals over an IP network.
Peer-to-Peer Architecture (P2P)
The application architecture in which most or all of the work is done by cooperating user computers, such as desktop PCs. If servers are present at all, they serve only facilitating roles and do not control the processing.
Enterprise resource planning (ERP)
is an integrated computer-based system used to manage internal and external resources including tangible assets, financial resources, materials, and human resources
Quality of Service (QoS)
Numerical service targets that must be met by networking staff.
Bits Per Second (BPS)
a measurement unit for the rate of speed for a computer sound file, related to the quality of sound the faster the bps the higher the quality of sound
Multiplexing
1) Having the packets of many conversations share trunk lines; reduces trunk line cost. 2) The ability of a protocol to carry messages from multiple next-higher-layer protocols in a single communication session.
The Systems Development Life Cycle (SDLC)
in systems engineering and software engineering, is the process of creating or altering systems and the models and methodologies that people use to develop these systems. The concept generally refers to computer orinformation systems.
Latency
Delay, usually measured in milliseconds.
Cryptography
Mathematical methods for protecting communication.
Internet Service Provider(ISP)
Carrier that provides Internet access and transmission.
Network Access Point (NAP)
A site where ISPs interconnect and exchange traffic
Domain Name System (DNS)
A server that provides IP addresses for users who know only a target host’s host name. DNS servers also provide a hierarchical system for naming domains.
Wide Area Network (WAN)
A network that links different sites together.
Simple Network Management Protocol (SNMP)
The protocol that allows a general way to collect rich data from various managed devices in a network.
Semantics
In message exchange, the meaning of each message
Syntax
In message exchange, how messages are organized.
Data Field
The content delivered in a message.
Network Architecture
1) A broad plan that specifies everything that must be done for two application programs on different networks on an internet to be able to work together effectively. 2) A broad plan for how the firm will connect all of its computers within buildings (LANs), between sites (WANs), and to the Internet; also includes security devices and services.
The Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
is an abstract description for layered communications and computer network protocol design
Octet
refers to an entity having exactly eight bits
Hops
In computer networking a hop represents one portion of the path between source and destination.
User Datagram Protocol (UDP)
Unreliable transport-layer protocol in TCP/IP
Decapsulation
The removing of a message from the data field of another message.
Propagation
The transmission (spreading) of signals from one place to another.
Attenuation
The degeneration of a signal over distance on a network cable is called attenuation.
Baud Rate
The number of clock cycles a transmission system uses per second.
Electromagnetic Interference (EMI)
Unwanted electrical energy coming from external devices, such as electrical motors, fluorescent lights, and even nearby data transmission wires.
Parallel Transmission
A form of transmission that uses multiple wire pairs or other transmission media simultaneously to send a signal; increases transmission speed.
Dead spot
A location where a receiver cannot receive radio transmission, due to an obstruction blocking the direct path between sender and receiver.
Topology
The way in which nodes are linked together by transmission lines.
Baseband
Transmission in which the signal is simply injected into a wire.
Broadband
1) Transmission where signals are sent in wide radio channels; 2) any highspeed transmission system.
Ethernet
is a family of frame-based computer networking technologies for local area networks (LANs).
Media Access Control (MAC)
The process of controlling when stations transmit; also, the lowest part of the data link layer, defining functionality specific to a particular LAN technology
Virtual LAN (VLAN)
A closed collection of servers and the clients they serve. Broadcast signals go only to computers in the same VLAN.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
The process wherein if a station wants to transmit, it may do so if no station is already transmitting but must wait if another station is already sending. In addition, if there is a collision because two stations send at the same time, all stations stop, wait a random period of time, and then try again.
Wireless LAN (WLAN)
A local area network that uses radio (or rarely, infrared) transmission instead of cabling to connect devices.
Access Point
A bridge between a wireless station and a wired LAN
Bluetooth
A wireless networking standard created for personal area networks
Spectrum
The range of all possible frequencies from zero hertz to infinity
Carrier Sense Multiple Access with Collision Avoidance and Acknowledgements (CSMA/CA+ACK)
A mandatory mechanism used to reduce problems with multiple simultaneous transmissions, which occur in wireless transmission. CSMA/CA+ACK is a media access control discipline, and it uses both collision avoidance and acknowledgement frames
Multiple Input/Multiple Output (MIMO)
A radio transmission method that sends several signals simultaneously in a single radio channel.
Wardriving
is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA
WEP security
is a deprecated algorithm to secure IEEE 802.11 wireless networks
Rogue access point
is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator
Virtual Private Network (VPN)
A network that uses the Internet with added security for data transmission.
Personal Area Network(pan)
Based on the electric-field transmission medium, is an technology that allows individuals to exchange data with a simple touch or grasp
Radio Frequency ID (RFID)
A tag that can be read at a distance by a radio transmitter/receiver.
Public Switched Telephone Network (PSTN)
The worldwide telephone network
Dial-up Internet access
is a form of Internet access that uses telephone lines
Leased line
is service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two locations in exchange for a monthly rent (hence the term lease
Digital Subscriber Line (DSL)
A technology that provides digital data signaling over the residential customer’s existing single-pair UTP voice-grade copper access line.
INTERNAL & BORDER ROUTERS
is a device that interconnects two or more computer networks, and selectively interchanges packets of data between them
Subnet Mask
A mask with 1s in the network and subnet parts and zeros in the host part.
ROUTING TABLE
is an electronic table (file) or database type object that is stored in a router or a networked computer
Compromise
A successful attack.
Malware
Software that seeks to cause damage.
Virus
A piece of executable code that attaches itself to programs or data files. When the program is executed or the data file opened, the virus spreads to other programs or data files.
Worm
An attack program that propagates on its own by seeking out other computers, jumping to them, and installing itself
Trojan Horse
A program that looks like an ordinary system file, but continues to exploit the user indefinitely.
Spam
Unsolicited commercial e-mail.
Social Engineering
Tricking people into doing something to get around security protections.
Hacking
The intentional use of a computer resource without authorization or in excess of authorization.
Denial-of-service attack (DoS) or Distributed denial-of-service attack (DDoS )
is an attempt to make a computer resource unavailable to its intended users
Defense in Depth
The use of successive lines of defense
Credentials
Proof of identity that an applicant can present during authentication.
Private Key
A key that only the true party should know. Part of a public key–private key pair.
Public Key
A key that is not kept secret. Part of a public key–private key pair.
DIGITAL CERTIFICATE
an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so fort
BRUTE FORCE
is a strategy used to break the encryption of data.
Biometrics
The use of bodily (Finger) measurements to identify an applicant.
Intrusion Detection System (IDS)
A security system that examines messages traveling through a network. IDSs look at traffic broadly, identifying messages that are suspicious. Instead of discarding these packets, IDSs will sound an alarm.
Intrusion Protection System (IPS)
Firewall system that uses sophisticated packet filtering methods to stop attacks.
Encryption
is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge,
Electronic Signature
A bit string added to a message to provide message-by-message authentication and message integrity.
Group Policy Object (GPO)
A policy that governs a specific type of resource on a domain
Network Address Translation (NAT)
Converting an IP address into another IP address, usually at a border firewall; disguises a host’s true IP address from sniffers. Allows more internal addresses to be used than an ISP supplies a firm with external addresses.
Domain Name System (DNS)
A server that provides IP addresses for users who know only a target host’s host name. DNS servers also provide a hierarchical system for naming domains.
Dynamic Host Configuration Protocol (DHCP)
The protocol used by DHCP servers, which provide each user PC with a temporary IP address to use each time he or she connects to the Internet.
Simple Network Management Protocol (SNMP)
The protocol that allows a general way to collect rich data from various managed devices in a network.
Sniffer
computer software or hardware that can intercept and log traffic passing over a digital network