• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
host/client
host provide client, client needs service of host
application server
provides remote application services to those who request it in a network
hub
connects multiple twisted pair of fiber optic ethernet devices together to make a single network
switch
joins multiple computers together within one local area network
router
selects best possible path for data packet to be sent from one computer network to another
WAP
wireless access point
allows wireless device to connect to Wi-Fi network
firewall
allows all traffic coming in and going out to go through set filters and rules for network
VPN connector
virtual private network
allows user to remotely access a secure tunnel
Back-up
copy of settings or software
repeater
allows for network cable to be lengthened by refreshing signal and resending it
7 patterns network can be connected
star
mesh
ring
line
tree
bus
fully connected
size of LAN area network
small geographical area (office)
size of WAN network
very large geographical network
size of MAN network
larger than LAN, but not larger than city
size of GAN network
can switch to a different LAN in larger geographical area
name 7 layers of the OSI model
7) application
6) presentation
5) session
4) transport
3) network
2) data link
1) physical
NIPERNET
sensitive, but unclassified
SIPERNET
classified up to SECRET
JWICS
TOP SECRET
virus vs. worm
both infect computer systems, work can't reproduce itself
trojan
program enters system using another program
attacker sends email to using claiming to be real company
phishing
purpose of PKI
manages, distributes and revokes digital signatures
purpose of DNS
domain name systems
names for computers, services or any resources connected to internet or private network
backdoor
inserting program entrance for attack