• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back

Host/Client

Client/Host architecture allows for multiple clients to connect and share resources on host servers.

Application Server

A server that is designed for or dedicated to running specific applications

Hub

Central connection point for network


(OSI Layer 1 Physical)

Switch

central connection point for a network


(OSI Layer 2 Data Link)

Router

A networking device that forwards packets between networks by determining the best path to the destination. (OSI layer 3 Networking)

WAP

Wireless application protocol

Proxy server

a server that acts as an intermediary for request from clients seeking resources from other services.

Firewall

The first line of defense for a network.

Back up

Making copies of data so that these additional copies may be used to restore the original after a data loss event.

Repeater

an electronic device that receives a signal, cleans it or unnecessary noise, and regenerates it, and retransmits it at a higher power level. (OSI layer 1 physical)

Topology

Refers to the physical arrangement of a LANs components.

Bus

uses a common backbone or single cable to connect all devices

Star

features a central connection point (hub, switch, router)

Ring

Every device has exactly two neighbors for communication purposes.

Mesh

a network where all the nodes are connected to each other

LAN

Local area network

WAN

Wide Area Network

MAN

Metropolitan Area Network

GAN

Global Area Network

OSI Model

1. Physical


2. Data Link


3. Network


4. Transport


5. Session


6. Presentation


7. Application



(Acronym: Please Do Not Throw Sausage Pizza Away or P. Diddy Needs To Stop Producing Albums)

NIPRNET

Non-Classified Internet Protocol Router Network

SIPRNET

Secret Internet Protocol Router Network

JWICS

Joint Worldwide Intelligence Communication Systems

Virus

Malicious code written with an intention to damage the user's computer

Worm

self replicating malware

Trojan

a harmful piece of malware that looks legitimate

Backdoor

program that a hacker installs on a target system to allow access to the system at a later time.

Phishing

criminally fraudulent process of attempting to acquire sensitive info such as usernames, passwords, etc. by masquerading as a trustworthy entity in an electronic communication.

Brute Force Attack

a strategy used to break the encryption of data

Social Engineering

the act of manipulating people into performing actions or divulging confidential information.

PKI

Public Key Infrastructure

DNS

Domain Name System: translates alphabetic domain names into numeric IP addresses.