Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
host/client
|
host provide client, client needs service of host
|
|
application server
|
provides remote application services to those who request it in a network
|
|
hub
|
connects multiple twisted pair of fiber optic ethernet devices together to make a single network
|
|
switch
|
joins multiple computers together within one local area network
|
|
router
|
selects best possible path for data packet to be sent from one computer network to another
|
|
WAP
|
wireless access point
allows wireless device to connect to Wi-Fi network |
|
firewall
|
allows all traffic coming in and going out to go through set filters and rules for network
|
|
VPN connector
|
virtual private network
allows user to remotely access a secure tunnel |
|
Back-up
|
copy of settings or software
|
|
repeater
|
allows for network cable to be lengthened by refreshing signal and resending it
|
|
7 patterns network can be connected
|
star
mesh ring line tree bus fully connected |
|
size of LAN area network
|
small geographical area (office)
|
|
size of WAN network
|
very large geographical network
|
|
size of MAN network
|
larger than LAN, but not larger than city
|
|
size of GAN network
|
can switch to a different LAN in larger geographical area
|
|
name 7 layers of the OSI model
|
7) application
6) presentation 5) session 4) transport 3) network 2) data link 1) physical |
|
NIPERNET
|
sensitive, but unclassified
|
|
SIPERNET
|
classified up to SECRET
|
|
JWICS
|
TOP SECRET
|
|
virus vs. worm
|
both infect computer systems, work can't reproduce itself
|
|
trojan
|
program enters system using another program
|
|
attacker sends email to using claiming to be real company
|
phishing
|
|
purpose of PKI
|
manages, distributes and revokes digital signatures
|
|
purpose of DNS
|
domain name systems
names for computers, services or any resources connected to internet or private network |
|
backdoor
|
inserting program entrance for attack
|